Lessons From Text Messaging Leaks – The Jeff Bezos Case

Shortly after Amazon CEO Jeff Bezos and his wife Mackenzie announced that they were divorcing, the National Enquirer published text messages that Bezos had reportedly sent to Lauren Sanchez, who he is currently in a relationship with. Bezos, like … Continue reading Lessons From Text Messaging Leaks – The Jeff Bezos Case

Why Businesses Need Secure Messaging That Goes Beyond Encryption

The post Why Businesses Need Secure Messaging That Goes Beyond Encryption appeared first on Vaporstream.
The post Why Businesses Need Secure Messaging That Goes Beyond Encryption appeared first on Security Boulevard.
Continue reading Why Businesses Need Secure Messaging That Goes Beyond Encryption

Controlling the Narrative: The Role of the Board of Directors

In an era where data breaches or leaks seem inevitable, business disruptions too frequent and the press all too prone to run away with a salacious story, what can the board of directors do to protect sensitive corporate data? It is all too easy for inf… Continue reading Controlling the Narrative: The Role of the Board of Directors

Business Mobile Messaging – Making the Transportation Industry More Mobile

In this modern day and age, mobile business messaging—specifically, secure mobile business messaging—is a must-have for the transportation and logistics industry. Today, electronic data is a critical part of supply chains, making secure com… Continue reading Business Mobile Messaging – Making the Transportation Industry More Mobile

Text Message Security – It’s About Content Control

End-to-end encryption is often touted as the end-all be-all.  When it comes to text message security, encryption is definitely important. End-to-end encryption essentially ensures that while a message is in transit—that is to say, … Continue reading Text Message Security – It’s About Content Control

Cybersecurity breaches in 2018: What We Learned

In 2018 technology touches nearly every aspect of our life. But no innovation seems to come without some form of drawback or compromise. While technology has undoubtedly improved most of our lives, it has also brought new risks that we all find a way t… Continue reading Cybersecurity breaches in 2018: What We Learned

Ahead of the Curve: University Incident Response Plans and Communications

Hurricanes, power-outages, man-made disasters—every organization has to prepare for these but when it comes to emergencies, universities face unique challenges because of the very nature of their structure and communities. Unlike the average offi… Continue reading Ahead of the Curve: University Incident Response Plans and Communications

Responding Quickly: Law Enforcement and Secure Communications

In emergency situations, speed is key for first responders. Law enforcement agencies need to have the tools in place to be able to communicate and coordinate quickly.  Using old and clunky tools—like desktops and laptops—are simply not… Continue reading Responding Quickly: Law Enforcement and Secure Communications

Secure and Compliant Grid Modernization

For more than a decade, the energy and utilities industry has been investing in smarter energy infrastructure in order to enhance energy grid resiliency, reliability and efficiency. Grid modernization has become essential to integrating an increasing n… Continue reading Secure and Compliant Grid Modernization