Be Aware
The Privoro blog features our thoughts on mobile security, company updates and more.
Our product demonstration calls cover the following:
- Understanding your secure mobility needs
- Privoro solution certifications and approvals, and current customers
- Implementation requirements for onboarding the Privoro solution
- A demonstration of SafeCase protections
Posts about
Smartphone Security
How Apple shapes the narrative about smartphone security.
In August, we conducted our annual survey designed to gauge attitudes about mobile security and...
1 minute read
Mobile Security,
Smartphone Vulnerabilities,
Smartphone Security,
JC2 Ventures,
Connecting the Dots,
John Chambers,
Trusted Hardware
The piece of hardware at the cutting edge of cybersecurity.
By John Chambers, Founder and CEO of JC2 Ventures and former CEO and Chairman of Cisco As a mentor,...
3 minute read
Mobile Security,
Privoro,
Smartphone Vulnerabilities,
Smartphone Security,
spyware,
SafeCase,
Data in Vicinity,
Smartphone Anti-Surveillance
6 bold predictions for smartphone security in 2019.
In the last 12 months, the threat of compromised smartphone cameras and microphones has taken on...
4 minute read
Mobile Security,
Privoro,
Smartphone Vulnerabilities,
Data Privacy,
Smartphone Security,
spyware,
SafeCase
Why does the world need a SafeCase?
We started Privoro in 2013 not merely as a company, but as a philosophy: that security and privacy...
3 minute read
Mobile Security,
Smartphone Vulnerabilities,
Smartphone Security,
Voice Security,
IoT Security,
JC2 Ventures,
Connecting the Dots,
John Chambers
Voice is the next interface, but what does that mean for mobile security?
By John Chambers, Founder and CEO of JC2 Ventures and former CEO and Chairman of Cisco Ten years...
3 minute read
Global SOF Modern Warfare Conference recap.
Privoro recently attended the GSF Modern Warfare conference at Fort Bragg, home of the 82nd...
1 minute read
Smartphones becoming hackers' favorite target.
Our world is filled with news and conversations about hacking. From well-publicized public hacks...
3 minute read
Mobile Security,
Smartphone Vulnerabilities,
Smartphone Security,
SCIF Security,
SCIF Spaces,
Secure Spaces,
Government
Pentagon smartphone security policy.
Pentagon’s smartphone policy costs taxpayers an estimated $2 million per day
2 minute read
Mobile Security,
Mobile Espionage,
Data Privacy,
Cybersecurity,
Smartphone Security,
Corporate Espionage,
Enterprise
Corporate espionage has gone mobile and gotten personal.
Economic espionage – also known as industrial espionage, corporate espionage and corporate spying...
4 minute read