Privoro

The importance of trust in leading a market transition

Posted by John Chambers on Dec 5, 2019 11:10:29 AM

As I wrote in my book Connecting the Dots, trust is one of a company’s two most important assets (the other is information). For a company looking to lead a market transition, establishing trust is a bit like the old chicken and egg dilemma: The company can’t earn trust without customer validation, yet they can’t get customers without first establishing trust. This is exactly why the hardest customer to land is always the first – and why, at the end of the day, successfully navigating the delicate balance of trust becomes vital to survival.

Read More

Topics: Mobile Security, Privoro, JC2 Ventures, Connecting the Dots, John Chambers, Trusted Hardware, Mike Fong

The piece of hardware at the cutting edge of cybersecurity.

Posted by John Chambers on Mar 4, 2019 6:10:51 AM

By John Chambers, Founder and CEO of JC2 Ventures and former CEO and Chairman of Cisco

As a mentor, investor, and longtime player in the tech industry, I’m frequently asked which market segments I’m betting big on over the coming decade. My knack for spotting market transitions and the technologies that will fuel these shifts partially stems from my relentless focus on outcomes. That’s why I approach investing like a multiplayer chess game; I play out the entire game, replay various scenarios and anticipate others’ moves before I make the decision to invest my time and resources.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Smartphone Security, JC2 Ventures, Connecting the Dots, John Chambers, Trusted Hardware

Voice is the next interface, but what does that mean for mobile security?

Posted by John Chambers on Oct 2, 2018 7:04:30 PM

By John Chambers, Founder and CEO of JC2 Ventures and former CEO and Chairman of Cisco

Ten years ago, I would have said that voice was an interface of the past. Yet today, the voice revolution is well underway and it’s becoming clear that voice will, in fact, be the next major interface. Just look at the proliferation and capabilities of virtual assistants and voice-activated devices, whether it’s asking Amazon’s Alexa-enabled Echo to turn down the thermostat, having Google Home recite your schedule for the day, or instructing Apple’s Siri to read your emails out loud. While nearly one in five Americans has access to a smart speaker today, Gartner predicts that 75 percent of households in the U.S. will have smart speakers by 2020.

Read More

Topics: Mobile Security, Smartphone Vulnerabilities, Smartphone Security, Voice Security, IoT Security, JC2 Ventures, Connecting the Dots, John Chambers

At Privoro, we’re rethinking mobile security to empower you to participate in our hyper-connected, data-driven world without giving up control of your personal information. Stay tuned to our blog to learn about the big problems we’re solving and why we’re using mobile security hardware systems to solve them.

Subscribe Here!

Recent Posts