We are pleased to share that Wickr has been acquired by Amazon and is now part of the Amazon Web Services (AWS) team. We’re proud to have created highly trusted, secure communication solutions for messaging, video conferencing, file sharing, and more. From our founding ten years ago, we have grown to serve organizations across a wide range of industries, all over the world. Together with AWS, we look forward to taking our solutions to the next level for our customers and partners. Learn more here →

Category: Crypto/Security

5 Secure Communication Methods Every Enterprise Should Have

Every organization needs to foster communication and collaboration between its employees, while at the same time maintaining a level of security that protects the company’s most valuable assets. What communication methods are necessary for the success of your enterprise—and how can you best secure those processes? Why Secure Communication is

Read more →

5 Security Compliance Trends to Watch for in 2021

As we ring in the new year, it is natural to reflect on the year behind us and look ahead to the year in front of us. Memories of 2020 will likely revolve around the COVID-19 pandemic, when the world seemed to stand still at the threat of the novel

Read more →

The New Battleground: Cybersecurity and the Department of Defense

Because the Department of Defense (DoD) is broadly charged with defending the country against all threats, military and otherwise, cybersecurity has always been part of its portfolio. The DoD first warned about potential vulnerabilities in computer networks almost fifty years ago, and over the years the individual branches of the

Read more →

Data Encryption 101: Best Practices

If you are new to data security, encryption might seem overly complicated and hard to understand. While encryption itself can be complex, understanding what it is and how it works doesn’t have to be. Encryption is the process of encoding data so that it cannot be read without a key.

Read more →

5 Key Elements of Data Encryption Best Practices

Gone are the days of rooms full of filing cabinets — your enterprise’s data is now digital. As such, protecting sensitive data has never been more critical. Cybercriminals are also becoming more skilled at gaining access to sensitive data, requiring businesses to take a proactive role in protecting important information.

Read more →

The Top 5 Cybersecurity Threats to Defense Contractors

Malicious actors have always targeted government entities, especially the Department of Defense, in search of state and military secrets. Today, many of these attacks are also aimed at defense contractors who have access to confidential information – and to DoD networks and systems. Why Contractors are Particularly Vulnerable to Cyber

Read more →

3 Signs of a Cyber Attack and the First 3 Steps to Take

Cyber attacks can hit companies of any type and size. A study by the University of Maryland revealed that a computer is hacked every 39 seconds, for an average of 2,244 cyber attacks every single day. According to IBM’s Cost of a Data Breach Report, the average cyber attack costs

Read more →