Blog Posts LinkedIn, Spies and Espionage British officials have uncovered a ruse alleging Chinese spies are using LinkedIn to target and…Don SortorOctober 19, 2023
Blog Posts The Malware Maelstrom Malware-as-a-Service (MaaS) operations continue to pose significant security and operational risks to organizations of all…Don SortorOctober 17, 2023
Blog Posts Maintaining Secure Communications in High-Risk Environments As organizations deploy teams in high-risk environments around the world, the need for secure communications…Don SortorOctober 13, 2023
Blog Posts What is Your Privacy Worth? It is a simple question, but most cannot put a value on it. When you…Don SortorOctober 3, 2023
Blog Posts Tracking Your Phone There seems to be no shortage of corporate espionage incidents as well as foreign and…Don SortorSeptember 28, 2023
Blog Posts False Sense of Secure Communications Apps Telegram, WhatsApp, SIGNAL, and WickR are widely used by billions of people to facilitate phone…Don SortorSeptember 26, 2023
Blog Posts Eavesdropping and Espionage Earlier this month it was reported that Norwegian intelligence officials arrested a Malaysian student on…Don SortorSeptember 19, 2023
Blog Posts If China Can Hack Microsoft, How About You? Last month Microsoft disclosed that unclassified email systems of several State Department officials were compromised,…Don SortorSeptember 7, 2023
Media Coverage Mitigating the Alarming Extent of Publicly Accessible Personal Data through Global Integrity’s QTel In this Ontic podcast interview with Fred Burton, our CEO Bill Marlow discusses the hard truth about how the…William PennAugust 31, 2023
Blog Posts Spies Among (and Beyond) Us In the world of international espionage, where nations deploy spies to target and infiltrate other…Don SortorAugust 31, 2023