June 20, 2022
|
Wickr for Government Achieves FedRAMP Ready DesignationAWS is pleased to announce that Wickr for Government (WickrGov) has achieved Federal Risk and Authorization Management Program (FedRAMP) Ready status at the Moderate Impact ... |
March 23, 2021
|
Election Security and the Intelligence Community AssessmentThe US Intelligence Community last week released the unclassified version of its report on foreign interference in the 2020 Federal elections. The investigation found no ... |
March 17, 2021
|
What Cyber Risks will Biden’s Supply Chain EO Uncover?As more details have emerged about the breach into federal agencies involving SolarWinds Orion, senior administration officials and analysts have started calling the incident a ... |
February 26, 2021
|
The Consequences Of Choosing Speed Over SecurityIn the wise words of Richard Powers, “Money you lose by slowing down is always more important than money you’ve already made.” |
February 08, 2021
|
Wickr’s New ‘Global Federation’ Feature Allows E2EE Communications Between Government & EnterpriseWickr, one of the top secure collaboration platforms, recently announced the availability of “Global Federation”, a feature that will allow enterprise and ... |
February 07, 2021
|
Encryption Isn't The Problem; It's The SolutionEncryption is one of the most transformative and vital technologies available today. |
February 02, 2021
|
Wickr To Enable Secure, Cross-Platform Collaboration and ComplianceWickr Inc., the world’s most secure collaboration platform, today announced the general availability of “Global Federation”, a feature that will allow enterprise and ... |
January 15, 2021
|
SolarWinds Fallout Makes Secure Communications a Critical First Line of DefenseOver the past weeks, U.S. government agencies, critical infrastructure entities, and private sector organizations have been scrambling to address what is now being considered a ... |
January 12, 2021
|
Capitol Building Breach Poses Cybersecurity RisksWhile security experts are divided on the level of risk, they agree there is a potential for threats after rioters stormed the Capitol building and ransacked offices. |
January 11, 2021
|
Cleaning up SolarWinds hack may cost as much as $100 billionAmerican businesses and government agencies could be spending upward of $100 billion over many months to contain and fix the damage from the Russian hack against the SolarWinds ... |
January 06, 2021
|
Defense Department must determine the threat from quantum computersThe U.S. Department of Defense must determine the national security threat posed by quantum computing, as part of the new annual defense policy law. |
December 31, 2020
|
Post-Quantum Cryptography Key to Future Data SecurityIt took a compelling proposition to lure Dr. Joel Alwen from academia and into business and Wickr was too interesting to pass up. |
December 30, 2020
|
Mobile Endpoint Security: Still the Crack in the Enterprise's Cyber ArmorA combination of best practices and best-in-class technology will help keep your enterprise from falling victim to ever-growing threats. |
December 23, 2020
|
Wickr CEO on Possible Data Stolen in the SolarWinds AttackTwo weeks ago, it was discovered that the SolarWinds systems had been hacked for the past several months, likely by Russian operatives. Initially thought to just affect the ... |
December 23, 2020
|
Emerging Tech Supporting Government Response SolarWinds HackWould 2020 really be complete without a last-minute crisis? SolarWinds Orion, which federal agencies use widely, got hacked. In response, the Cybersecurity and Infrastructure ... |
December 17, 2020
|
‘It’s going to take a lot of digging’: The Pentagon’s long search to see if anyone’s hiding in its networksThe military and intelligence community is scrambling to conduct a daunting hunt across disconnected networks to assess potential damage from an extensive federal cybersecurity ... |
December 16, 2020
|
Prioritize Cybersecurity to Protect Your Business Before It Is Too LateIf you don't give your company's data security enough attention, the bad guys will. |
December 16, 2020
|
Insiders cite sophistication of SolarWinds attack, and the need for coordinated deterrence initiativeKiersten Todt, a veteran cybersecurity policy leader, says the SolarWinds cyber attack demands a policy response beyond one-off retaliation against a foreign aggressor, and ... |
December 13, 2020
|
Why You Should Check These WhatsApp Risks While You’re WorkingThe corporate IT landscape has materially changed this year, with suddenly working from home employees pushing IT departments to flex enterprise-grade security to cope. This is ... |
December 08, 2020
|
Insecure Communications Like WhatsApp Are Putting U.S. National Security at RiskThe proliferation of consumer-grade communications applications has given rise to widespread, unsanctioned use throughout the military community. |
November 29, 2020
|
Why You Should Change These 3 Critical WhatsApp SettingsMalicious WhatsApp hacks are making news again this week, with more users tricked into surrendering their accounts to attackers who then target their contacts with malware and ... |
November 14, 2020
|
The growing need for encrypted communicationsKeeping communication private and secure is increasingly important for both businesses and consumers |
November 10, 2020
|
Why Small Businesses Should Ignore California's Newest Data Privacy LawThe recently passed ballot measure favors big tech and carries exemptions for the smallest companies. |
November 09, 2020
|
End-to-end encrypted communication mitigates enterprise security risk and ensures complianceIt is a mathematical certainty that data is more protected by communication products that provide end-to-end encryption (E2EE). |
October 15, 2020
|
Why it’s time to prioritize communications securityEvery once in a while, something happens where you throw your hands up and say: “That’s what I’ve been saying!” No, it wasn’t when NFL analysts predicted that my ... |
October 01, 2020
|
Blockchain or bust? Experts debate applications for electionsBlockchain has been proposed as a solution for security issues around e-voting. But some infosec experts are skeptical that the technology is the right fit for U.S. ... |
September 18, 2020
|
With Trump’s WeChat ban approaching, here are several alternativesWeChat, China's most popular app, faces an imminent ban in the U.S., leaving many of its users in a bind. |
August 21, 2020
|
DoD Cyber Veteran Blake Moore Joins Wickr to Advance Company Strategy, Scale Secure CommunicationsWickr Inc., the secure collaboration platform, today announced the appointment of Blake Moore as Vice President of Strategy and Operations. Moore joins the company from the U.S. ... |
August 20, 2020
|
Chris Howell – TechStrong TV |
August 15, 2020
|
Why TikTok Users Should Switch To iPhonesHere’s a little twist in the whole TikTok debate—the difference between running the Chinese video sharing app on Android versus iPhone. There are far more TikTok users on ... |
August 05, 2020
|
Why corporate communication tools are the new threat vector [Q&A]In the new normal world where more work is being carried out remotely, corporate communications have increased in importance but they have also come under greater threat. |
July 15, 2020
|
When the Environment Changes, You Change with ItTeleworking is, seemingly, going to be the norm for quite some time for those of us who are fortunate enough to be able to work from home – bringing with it a host of security ... |
July 10, 2020
|
Businesses are turning to more secure communication tools to avoid govt overreach: encryption platform reportEncryption platform sees spike during lockdown in users from countries where govts support contact tracing |
July 08, 2020
|
Wickr to Help US Military Departments Secure CommsWickr has secured a potential two-year, $35M contract to provide a recall, alert and messaging service to all three military departments under the Department of Defense. |
July 08, 2020
|
Wickr to provide secure communications platform across US DoDWickr has secured a contract from the US Air Force (USAF) to provide its recall, alert and messaging (Wickr RAM) across the US Department of Defense (DoD). |
June 25, 2020
|
Cybersecurity Steps For Law Firms Amid Heightened RisksIt shouldn't be a surprise that law firms are an attractive target for cybercriminals, as firms frequently work with critical and confidential information, intellectual ... |
June 25, 2020
|
Air Force awards multimillion-dollar secure communications contract to Wickr to provide digital encryptionWickr's software secures things on a day-to-day basis, but in special circumstances enables users to create temporary secure operating environments. |
June 08, 2020
|
Federal-grade encryption from the comfort of homeWith the COVID crisis pushing federal employees to work from home, we’re seeing a first-of-its-kind test for the way modern government functions. Even as agencies take great ... |
June 06, 2020
|
Wickr Selected To Provide end-to-end encrypted file, video, chat, text and voice services to US Air ForceThe Department of Defense contract announcements for 1 June 2020 announced an award for Wickr that will enable this provider of secure communications to serve the US Air Force ... |
June 05, 2020
|
Air Force awards multimillion-dollar secure communications contractThe Air Force awarded a contract potentially worth $35 million to Wickr, a secure communications platform provider, the Defense Department announced June 1. |
May 21, 2020
|
Surveillance Fears Drive Business Use of Secure Collaboration Tools:Fear of Government Surveillance Overreach is Driving the Adoption of Secure Collaboration Platforms |
May 21, 2020
|
Centralized Contact Tracing Raises Concerns Among Privacy-Conscious CitizensThe long debate over whether encryption and anonymity shield too much criminal behavior also has staged a resurgence. |
May 05, 2020
|
Coronavirus and cyberattacks: 2020 campaigns already being hacked, experts warnPresident Trump signed an executive order to protect the power grid from hackers last week, but experts warn that the 2020 campaign cycle has already suffered cyberattacks. |
May 05, 2020
|
Aleksandr Yampolkiy and Joel Wallenstrom – TechStrong TV: |
April 29, 2020
|
Which video chat app is best for security?Virtual conferencing software—most notably Zoom, despite many recently uncovered vulnerabilities—is surging, as this newsletter has noted often. |
April 14, 2020
|
Videoconferencing Security, Transparency Issues a Long Time ComingIt was just a matter of time before security and transparency issues with videoconferencing platforms came to light, says Wickr CEO. |
March 25, 2020
|
Air Force’s emerging tech supply chain remains strong despite COVID-19Amidst talk of disrupted defense supply chains brought on by shuttered factories and global lockdowns, the Air Force says its industrial base for new technology is relatively ... |
January 23, 2020
|
Deployed 82nd Airborne unit told to use these encrypted messaging apps on government cell phonesA brigade of paratroopers deployed in early January to the Middle East in the wake of mounting tensions with Iran has been asked by its leadership to use two encrypted messaging ... |
January 11, 2020
|
Facebook’s New Messenger Admission: A Reason To Quit?Facebook’s Messenger service is not yet end-to-end encrypted by default, despite the bold promises CEO Mark Zuckerberg made last March. While the move would give Facebook ... |
November 25, 2019
|
CISTECH and AUCloud Announce Strategic Partnership with Wickr to bring Secure Messaging and Collaboration Technology to the Australian GovernmentLeading End-to-End Encryption Collaboration Platform Chosen for Standout Security, Collaboration, Compliance and Sovereignty |
November 07, 2019
|
The Cybersecurity 202: Political campaigns are flocking to encrypted messaging apps. But they're not a panaceaPolitical campaigns are flocking to encrypted messenging apps to avoid being the next big target after the Hillary Clinton campaign's emails were exposed by hackers in 2016. But ... |
November 01, 2019
|
Free & Discounted Security Services Now Available for US Election OrgsNonprofit Defending Digital Campaigns (DDC) offers security services for email, user education, mobile, and encrypted communications, to federal election committees. |
June 13, 2019
|
This Article Will Self-Destruct: Behind Ephemeral Messaging's In-House RiseEphemeral messaging apps, which automatically delete data after a set timeframe, can present significant roadblocks to in-house compliance and e-discovery operations. So why is ... |
July 26, 2018
|
Slack is teaming up with Hipchat -- only to kill it off |
October 19, 2017
|
Beyond Eavesdropping: Adversarial Models for Secure MessagingIn an age of ever more sophisticated cybercrime and mass surveillance, secure communication is an increasingly rare and premium commodity. As we develop better methods and ... |
October 19, 2017
|
Email is Closed for BusinessYour First Step in Boosting Corporate Security |
October 02, 2017
|
Wickr's Secure Collaboration ChannelsUsers on Wickr Pro can now securely connect, video conference, and share files with other companies and teams including Wickr Me users. |
September 25, 2017
|
Exposure of Your Sensitive Data isn’t a Bug, it’s a Feature |
August 04, 2017
|
Adopting Ephemeral Technology In the WorkplaceDeployment of a secure ephemeral messaging application has the potential to improve information security, significantly minimize the cost of electronic discovery in future ... |
July 14, 2017
|
Wickr Introduces Secure Group Calling, Video Conferencing Tool for the EnterpriseEarlier this week, Privacy Tech discussed the various risks that email presents for individuals and the enterprise. Private-sector and political organizations have suffered the ... |
December 16, 2016
|
477 Author: Andy GreenbergAndy Greenberg security 12.06.16 12:00 pm This App Wants to Be Your Encrypted, Self-Destructing SlackIf you use a workplace collaboration tool like Slack or Hipchat, it's easy to fall into an assumption of privacy, throwing around gossip and even sensitive business as if it ... |
December 06, 2016
|
Why Data Should Not Live Beyond Its Useful LifeA very wise man once said “we are at the knee of the curve for deployment of a different model of computation”. Those words stuck with me not just because they were Dan ... |