Be Aware
The Privoro blog features our thoughts on mobile security, company updates and more.
Our product demonstration calls cover the following:
- Understanding your secure mobility needs
- Privoro solution certifications and approvals, and current customers
- Implementation requirements for onboarding the Privoro solution
- A demonstration of SafeCase protections
Lawmakers’ smartphones and the battle of information.
There's a war out there, old friend. A world war. And it's not about who's got the most bullets....
1 minute read
Mobile Security,
SafeCase,
Mike Fong,
Blue Force Tracking,
Air Force,
SBIR,
Small Business Innovation Research,
USAF
Privoro announces Air Force contract.
I’m happy to share that the Air Force, through its Small Business Innovation Research (SBIR) programInfographic: Smartphone sensor security.
Organizations concerned about sensor abuse are now adopting the Privoro SafeCase™, a...
1 minute read
Mobile Security,
Smartphone Vulnerabilities,
Smartphone Security,
JC2 Ventures,
Connecting the Dots,
John Chambers,
Trusted Hardware
The piece of hardware at the cutting edge of cybersecurity.
By John Chambers, Founder and CEO of JC2 Ventures and former CEO and Chairman of Cisco As a mentor,...
3 minute read
Infographic: Smartphone ban and workplace security.
In our discussions with federal employees working under smartphone bans at the Pentagon and other...
1 minute read
Mobile Security,
Privoro,
Smartphone Vulnerabilities,
Smartphone Security,
spyware,
SafeCase,
Data in Vicinity,
Smartphone Anti-Surveillance
6 bold predictions for smartphone security in 2019.
In the last 12 months, the threat of compromised smartphone cameras and microphones has taken on...
4 minute read
SafeCase and beyond; safeguarding smartphone data.
Last month, we released our second-generation product, the Privoro SafeCase, which is compatible...
6 minute read
How smartphone espionage can disrupt an election.
The mobile security of political candidates and their staff gets lost in the shuffle when...
3 minute read
Smartphone Vulnerabilities,
China,
Supply Chain Attacks,
Supermicro,
Bloomberg Businessweek,
Supply Chain Security,
Supply Chain Risk
Demystifying the hardware supply chain for smartphones.
Earlier this month, a controversial report in Bloomberg Businessweek ignited a larger conversation...
4 minute read