Blog Posts “The Rule of One” – Keeping Secrets One of our staff members worked as an undercover operative for more than 10 years…Sidney ReillyNovember 16, 2023
Blog Posts How Your Phone Is Stealing Your Information… and What You Can Do About It So, it is a given that you have apps on your phone or mobile devices that…Sidney ReillyNovember 14, 2023
Blog Posts LinkedIn, Spies and Espionage British officials have uncovered a ruse alleging Chinese spies are using LinkedIn to target and…Don SortorOctober 19, 2023
Blog Posts Calculating the Cost of Business Disruptions Organizations spend billions on software and services related to migrations, upgrades, and new technology deployments.…Don SortorOctober 10, 2023
Blog Posts What is Your Privacy Worth? It is a simple question, but most cannot put a value on it. When you…Don SortorOctober 3, 2023
Blog Posts False Sense of Secure Communications Apps Telegram, WhatsApp, SIGNAL, and WickR are widely used by billions of people to facilitate phone…Don SortorSeptember 26, 2023
Blog Posts Creepy Car Confessions – Your Car is Listening Last month we discussed how smart cars collect a ton of data on you, primarily…Don SortorSeptember 21, 2023
Blog Posts Brazilian Escort Service Hacked – Another Cautionary Tale It was reported last week that Brazil’s top escort service was hacked, exposing the privacy…Don SortorAugust 29, 2023
Blog Posts What’s Up with WhatsApp? With billions of active monthly users, the WhatsApp platform is a prime target for hackers,…Don SortorAugust 24, 2023
Blog Posts Mergers, Acquisitions and the Need for Secure Communications Data clean room technology is widely used to support merger and acquisition activities, such as…Don SortorAugust 17, 2023