I’m pleased to announce that Privoro’s agreement with the U.S. Air Force was recently expanded in both size and scope. Valued at $37.1 million over four years, the expanded agreement puts SafeCase on a clear and defined path to become the trusted platform for secure mobility throughout the federal government.
Privoro awarded expanded agreement with the U.S. Air Force
Topics: Privoro, Air Force, Press release
The importance of trust in leading a market transition
As I wrote in my book Connecting the Dots, trust is one of a company’s two most important assets (the other is information). For a company looking to lead a market transition, establishing trust is a bit like the old chicken and egg dilemma: The company can’t earn trust without customer validation, yet they can’t get customers without first establishing trust. This is exactly why the hardest customer to land is always the first – and why, at the end of the day, successfully navigating the delicate balance of trust becomes vital to survival.
Topics: Mobile Security, Privoro, JC2 Ventures, Connecting the Dots, John Chambers, Trusted Hardware, Mike Fong
In the last 12 months, the threat of compromised smartphone cameras and microphones has taken on bigger real estate in the public consciousness, transforming from a largely abstract fear into a real, widespread and potentially devastating problem. The bad news is that this problem will get worse before it gets better. The good news is that security-centric organizations are looking for ways to proactively defend against this threat. So what will the next 12 months hold in store? Below, I’ve outlined six mobile security predictions for the coming year.
Topics: Mobile Security, Privoro, Smartphone Vulnerabilities, Smartphone Security, spyware, SafeCase, Data in Vicinity, Smartphone Anti-Surveillance
We started Privoro in 2013 not merely as a company, but as a philosophy: that security and privacy need not be casualties of our hyper-connected, sensor-driven, mobile-first world. That we should be able to trust and control our electronic devices. That our information is ours alone, and we should be able to control how it is accessed and shared.
Topics: Mobile Security, Privoro, Smartphone Vulnerabilities, Data Privacy, Smartphone Security, spyware, SafeCase
On Sunday, August 26th, the country will celebrate National Dog Day. Sure, this day was chosen to celebrate man’s best friend – those loving companions some of us just can’t live without.
Topics: Privoro, National Dog Day
Blocking smartphone cameras is easy. Protecting microphones is hard. Here’s why.
Over the last couple of years I’ve become much more security- and privacy-focused. Why?
Topics: Privoro, Smartphone Vulnerabilities, Mobile Tracking, Smartphone Security
The first time I heard about “Fake Cell Towers”, I thought to myself, Hold up. There is such a thing as a “fake” cell tower?!? Why would someone want or use a fake cell tower?
Topics: Privoro, Smartphone Vulnerabilities, Mobile Tracking, Smartphone Security, fake cell towers
Data in vicinity: Data collected in the presence of an electronic device.
In today’s digital-driven world, just about everything we do creates a data trail that can live forever. Clicking on a website, opening the garage door, adjusting the temperature in our houses, taking a rideshare to the airport, making a dinner reservation, scanning our boarding passes, “liking” a photo, recording a television show, sending a text to a client, making a request into a digital assistant … all create an unwitting data trail. That data is stored, analyzed, brokered, distributed, parsed, combined and attributed to individuals, companies and nation states.
Topics: Privoro, Data in Vicinity
Why did we start Privoro? Setting a new standard for mobile security.
Because we believe that people, businesses and governments should be able to trust and control their electronic devices and the sensitive information that is shared around them.
Topics: Mobile Security, Privoro, Data in Vicinity