In the world of crypto fund security, most managers focus on cold storage, multi-sig wallets, and institutional custody solutions. These defenses are critical, but they only protect digital assets, not the conversations that determine where those…
In the world of crypto fund security, most managers focus on cold storage, multi-sig wallets, and institutional custody solutions. These defenses are critical, but they only protect digital assets, not the conversations that determine where those…
It’s an undeniable fact that smartphones have become frontline assets in modern espionage. With nearly universal reliance on mobile devices, state-sponsored surveillance campaigns increasingly target these endpoints. Traditional mobile security…
As geopolitical tensions between the United States and China intensify, the need for secure phone communications has become urgent. U.S. businesses operating in or interacting with China must take a proactive stance to protect sensitive…
For most people, a compromised phone means a phishing link clicked, a malicious app downloaded, or an account accessed from an unfamiliar location. The remediation is straightforward: remove the offending app, change the passwords, run a scan. For…
Mobile advertising IDs (ad IDs) were created to personalize the consumer experience. But today, these unique device identifiers are doing far more than helping brands sell sneakers—they’re quietly powering a multibillion-dollar surveillance economy…
As threats to our mobile devices and privacy become increasingly prevalent and sophisticated, protecting highly confidential communications is more important than ever. This blog post explores how Sotera SecurePhones, the most secure phones on the…
Updated April 2026. Originally published April 2025. When The Atlantic revealed in March 2025 that senior U.S. national security officials had coordinated military strike plans over a Signal group chat — accidentally including a journalist — the…
A perspective from Frank Purdy, Managing Partner at Phronesis Research LLC.
In recent times, the privacy and security of mobile devices has come under mounting pressure and threats from various quarters around the globe. These attacks on privacy have laid bare the vulnerabilities we face and the threats to our fundamental…
The cybersecurity landscape is evolving rapidly, presenting both challenges and opportunities for businesses and technology professionals. As we look ahead, several key trends are emerging that warrant careful consideration and strategic planning.