Gain insight on industry updates, expert opinions, product announcements, and so much more.
A second phone number is an additional phone number that you can use on your existing device, separate from your primary number. You use a second phone number to shield your…
A masked email address is a unique, automatically generated email address that you can use to shield your primary email from spam and email scams…
Identity Fraud: A $50 billion opportunity in disguise for insurance companies Identity fraud isn’t slowing down. In fact, it’s accelerating. According to recent projections, global…
Insurance brand differentiation through PaaS There’s a new way to stand out in the insurance industry, and it’s not about offering lower premiums or faster…
You know how it goes: You fill in a survey. You give your name and phone number, sometimes even your zip code. Then the phone starts…
Your personal email address is a pot of gold to companies, data brokers, and cybercriminals. The companies want to obtain your email address to reach…
In an earlier article , you learned the six top privacy benefits when you use MySudo virtual cards: These strong privacy benefits are clearly superior…
MySudo is the only app on the market that gives you private phone, text, email, browser, and virtual payment cards all in one app. Recently,…
There’s a tempting login option online called ‘social login’ which allows you to access a third party website using your existing social account IDs. You’ve seen the buttons: ‘Log in with Google’ or ‘Continue with Facebook’…
Here’s a clever way to think about how Sudo digital identities work in your life: each Sudo identity is like a different hat. We all…
MySudo is a feature-packed privacy app. In fact, it’s the only privacy app on the market with private phone and video calling, text, email, browser, and…
If you live in California or elsewhere in the United States, you may have heard of the California Consumer Privacy Act (CCPA). You might not…
Picture a large and intricate spider’s web: hundreds of sticky threads, tightly and strategically woven into cross-hatched lines, poised to ensnare unsuspecting prey. Now picture…
Decentralized identity (also known as self-sovereign identity) is the future—and our secure digital identity, the Sudo, is opening up the possibility of decentralized identity for most…
When an application, like a dating site, requests personal information from its users, it is in a good position to obtain (or supply to a…
Achieving great privacy outcomes does not happen by chance. It requires thoughtful, informed design. Most importantly, privacy management demands an interdisciplinary, systems engineering approach because it spans:…
Our podcast makes privacy approachable with expert guests, thought-provoking discussions, and real-life stories.
Join the conversation by attending events where you get to meet and talk with the experts from Anonyome Labs.
Subscribe to our blog and stay updated on the latest industry insights, expert advice, and exclusive content delivered straight to your inbox.