How to Conquer Physical Threats

When we think about threats to data security our minds usually jump to cyberattacks. But the physical threat of someone stealing or losing a device makes sensitive data just as vulnerable. Between ...
Five Things You Should Know About the WhatsApp Hack

Five Things You Should Know About the WhatsApp Hack

The recent WhatsApp™ hack is pretty alarming: all the hackers had to do was drop a missed encrypted WhatsApp call to their target and—boom—spyware was installed. The hack didn’t require the user ...
Lessons From Text Messaging Leaks – The Jeff Bezos Case

Lessons From Text Messaging Leaks – The Jeff Bezos Case

Shortly after Amazon CEO Jeff Bezos and his wife Mackenzie announced that they were divorcing, the National Enquirer published text messages that Bezos had reportedly sent to Lauren Sanchez, who he is ...
Government Messaging Solutions for the 21st Century: Think Beyond Encryption

Government Messaging Solutions for the 21st Century: Think Beyond Encryption

The DNC email leak in 2016 revealed just how insecure email communications can be. It should be no surprise that government officials have been turning to other, more secure mediums, to communicate ...