Contact Us Schedule A Demo
Featured on The Opening Bell 1/3/18Liz Radford- Women’s March Chicago, Member of the Board of Directors.Women’s March Chicago launches “March to the Polls.” On January 20, 2018 women and allies will come together in downtown Chicago to celebrate the spirit of the resistance efforts over the past year and unite to focus on the 2018 elections and beyond. The fight for women’s rights & social justice through political engagement continues.Dr. Galina Datskovsky CEO of Vaporstream talks about hidden messaging in the age of zero-privacy.Keeping sensitive conversations from falling into the wrong hands by automatically deletingSEE DETAILS
0

Secure Messaging

The revelations Tuesday and Wednesday about the extensive use of Wickr inside Uber upended the high-stakes legal showdown with Alphabet’s Waymo unit, which accuses the ride-hailing firm of stealing its self-driving car secrets. The issue of course is not whether using Wickr or apps like it, including Vaporstream, is acceptable. The issue is when, where and how to use the application and what legitimate use indeed looks like.

0

Dive Brief:More companies are allowing the use of "ephemeral messaging apps" to protect sensitive internal communication in the workplace, CNN reports. Messages on apps like Wickr, Vaporstream and Telegram are secure from breaches and can be instantly and permanently deleted. Wickr messages are encrypted and not stored on servers, for example.The apps are more secure than email messaging, which is easily and frequently targeted by hackers, but destroying messages immediately after sending and receiving them could violate the law. Some state and federal laws require companies to retain health and employment messages and records forSEE DETAILS
0

Privacy

Face ID is a facial scanner that will replace Apple’s Touch ID, allowing people to unlock their iPhone with their face. Sounds simple and convenient but it also has many privacy experts concerned. In fact, Apple’s embrace of facial recognition opens a whole can of worms over security, the idea of people’s faces as their password and where this technology may take us.

0

According to a recent Accenture report, federal, state and local government agencies experience over 50 times more cyber incidents than any private-sector industry. Lured by the opportunity to disrupt or devastate mission-critical services, operations and systems, cyber adversaries are rarely deterred by defenses of public sector agencies -- especially since those agencies  have a reputation for being egregiously slow to embrace any sort of digital transformation.It should come as no surprise, then, to learn that hackers and cyber criminals haven’t had to reinvent the wheel to successfully attack government agencies. EmailSEE DETAILS
0

The texts are long gone. That is becoming a more common reality in workplaces. More companies are starting to approve the use of ephemeral messaging apps like Wickr, Telegram and Vaporstream for internal communications. The tools are used for security. They can keep sensitive conversations from falling into the wrong hands by automatically deleting messages without saving a copy. But the apps are also stirring up legal, regulatory and company culture issues. For example, in its trade secrets fight between with Uber, Waymo claims that Uber executives used Wickr andSEE DETAILS
0

With all the security breaches in the news today, it’s astounding that the natural tendency for IT and security teams is to continue to be reactionary. Upon confirmation of a cyber-related event, security teams work diligently to ‘stop the bleeding’ before conducting forensics to determine the attack signature and attack vector, which might ultimately shed light on how the attack was perpetrated. Then, either out of genuine remorse towards its customers; a moment of humility, or Board appeasement, security policies, and procedures are either reaffirmed, updated or changed entirely. ThatSEE DETAILS
0

This article outlines a defensible strategy for securing assets based on information governance (IG) principles, and it suggests how IG and information security professionals can work together for a more secure and productive enterprise.The number of ways bad actors are accessing corporate data and impeding organizations from serving their customers is on the rise. Information protection is paramount for every organization’s ability to continue operating despite the daunting situations caused by cyber attacks and other out-of-course events, including natural disasters.The Cyber LandscapeAccording to “Beazley Breach Insights – January 2017,” theSEE DETAILS
0