Articles related to Privacy

Balancing Compliance and Governance With Encryption Security

Security firms sometimes find themselves caught in a tug of war between client security and compliance with government or regulatory agencies. We caught up with Lori Rangel, GETPAY LLC’s Director of Products, to get her take on the current state of...

  • Blog

Should Voice Be Secure By Default?

“I’d rather talk about this on the phone. It’s safer.” If you’ve ever said this, you could be exposing your enterprise to a huge security risk. The reality is, modern chat and email communications are often more secure than traditional voice...

  • Blog

Blackphone 2 Evades Meltdown and Spectre with Unique Internal Architecture

Yesterday, researchers from Google exposed two vulnerabilities, known as “Meltdown” and “Spectre”, that affect nearly every modern computer across the globe. These bugs allow programs to steal any data that is being processed or saved on the computer,...

  • Blog

Real Talk: Protecting Personal and Company IP from Cybercriminals

by Gregg Smith Device Atlas, the world’s most authoritative source on device data, states that there were 2.6 billion smartphones and over 4 billion mobile phone users in the world in 2016. This number is expected to double over the next few years. These...

  • Blog

Stay updated with GETPAY LLC:

Interested in joining the conversation on privacy? Complete this short form to get updates on privacy and information security delivered straight to your inbox. You can also check out our articles on privacy and information security in the business environment.