Privoro collaborates with Samsung to protect customers from spyware attacks

Privoro announced a new partnership with Samsung to provide a security capability for mobile devices. The new capability provides a critical shield against the invisible threat posed by modern cyberweapons via high-assurance control over the radios, se… Continue reading Privoro collaborates with Samsung to protect customers from spyware attacks

The weaponizing of smartphone location data on the battlefield

For soldiers on the battlefield, the act of turning on one’s smartphone has been described as the digital equivalent of lighting a cigarette, as doing so creates a signal about one’s location that can be picked up by the enemy. Despite this, smartphone… Continue reading The weaponizing of smartphone location data on the battlefield

Smartphone counterespionage for travelers

If you’re traveling abroad on business, there’s a good chance you’ll need to bring along a smartphone to get around, meet up with associates or learn about the idiosyncrasies of local culture. But even if you’re security-savvy and never let your device… Continue reading Smartphone counterespionage for travelers

Protect your smartphone from radio-based attacks

By now, most of us are aware that smartphones are powerful computers and should be treated as such. It’s not a coincidence that most of the security tips given to smartphone users – such as refraining from opening suspicious links or downloading untrus… Continue reading Protect your smartphone from radio-based attacks

Privoro awarded expanded agreement with the U.S. Air Force

I’m pleased to announce that Privoro’s agreement with the U.S. Air Force was recently expanded in both size and scope. Valued at $37.1 million over four years, the expanded agreement puts SafeCase on a clear and defined path to become the trusted … Continue reading Privoro awarded expanded agreement with the U.S. Air Force

Political campaigns adopt surveillance capitalism at their own peril

Since the middle of the 20th century, commercial advertising and marketing techniques have made their way into the sphere of political campaigns. The tactics associated with surveillance capitalism – the commodification of personal data for profit as m… Continue reading Political campaigns adopt surveillance capitalism at their own peril

Burner phones are an eavesdropping risk for international travelers

In recent years, burner phones have become an obligatory part of the international business traveler’s toolkit. But though these devices are designed to minimize the amount of stored data available for capture by malicious actors in a foreign country, … Continue reading Burner phones are an eavesdropping risk for international travelers

The importance of trust in leading a market transition

As I wrote in my book Connecting the Dots, trust is one of a company’s two most important assets (the other is information). For a company looking to lead a market transition, establishing trust is a bit like the old chicken and egg dilemma:… Continue reading The importance of trust in leading a market transition