Be Aware
The Privoro blog features our thoughts on mobile security, company updates and more.
Our product demonstration calls cover the following:
- Understanding your secure mobility needs
- Privoro solution certifications and approvals, and current customers
- Implementation requirements for onboarding the Privoro solution
- A demonstration of SafeCase protections
Posts about
Smartphone Vulnerabilities (2)
How smartphone espionage can disrupt an election.
The mobile security of political candidates and their staff gets lost in the shuffle when...
3 minute read
Smartphone Vulnerabilities,
China,
Supply Chain Attacks,
Supermicro,
Bloomberg Businessweek,
Supply Chain Security,
Supply Chain Risk
Demystifying the hardware supply chain for smartphones.
Earlier this month, a controversial report in Bloomberg Businessweek ignited a larger conversation...
4 minute read
Mobile Security,
Privoro,
Smartphone Vulnerabilities,
Data Privacy,
Smartphone Security,
spyware,
SafeCase
Why does the world need a SafeCase?
We started Privoro in 2013 not merely as a company, but as a philosophy: that security and privacy...
3 minute read
Mobile Security,
Smartphone Vulnerabilities,
Smartphone Security,
Voice Security,
IoT Security,
JC2 Ventures,
Connecting the Dots,
John Chambers
Voice is the next interface, but what does that mean for mobile security?
By John Chambers, Founder and CEO of JC2 Ventures and former CEO and Chairman of Cisco Ten years...
3 minute read
Mobile Security,
Smartphone Vulnerabilities,
Smartphone Security,
SCIF Security,
SCIF Spaces,
Secure Spaces,
Government
Pentagon smartphone security policy.
Pentagon’s smartphone policy costs taxpayers an estimated $2 million per day
2 minute read
Blocking smartphone cameras is easy. Protecting microphones is hard. Here’s why.
Over the last couple of years I’ve become much more security- and privacy-focused. Why?
4 minute read
Mobile Security,
Mobile Surveillance,
Smartphone Vulnerabilities,
Computer Security,
Smartphone Security,
Cyber Hygiene
Cybersecurity tips. Part 3: Digital hygiene.
This is the third installment of a three-part series on cybersecurity advice. In part 1, I covered...
5 minute read
Mobile Security,
Mobile Surveillance,
Smartphone Vulnerabilities,
Computer Security,
Smartphone Security,
Online Behavior
Cybersecurity tips. Part 2: Online behavior.
This is the second portion of a three-part series on Cybersecurity advice. In Part 1, I covered...
4 minute read
Mobile Security,
Mobile Surveillance,
Smartphone Vulnerabilities,
Computer Security,
Smartphone Security
Cybersecurity tips. Part 1: Awareness.
When I started my career over 20 years ago, I was issued a corporate laptop with a phone-line...
4 minute read