Category: Privacy & Security

Search

The Limitations of Traditional PKIs in Meeting Enterprise Identity Management Needs

Public key infrastructures (PKIs) cover all elements of establishing and managing public key encryption, currently the foundational form of encryption used to communicate securely on…

Business Benefits of Decentralized Identity Tech for Customer Management

Businesses that recognize and seize the opportunity to use emerging standardized decentralized identity technologies for customer identity management will create a long-term competitive advantage that will enable them to leapfrog the competition and maintain their lead…

Use MySudo’s Digital Identities to Wear Multiple Hats

Here’s a clever way to think about how Sudo digital identities work in your life: each Sudo identity is like a different hat. We all…

8 Strong Privacy and Security Features You’ll Find in MySudo

MySudo is a feature-packed privacy app. In fact, it’s the only privacy app on the market with private phone and video calling, text, email, browser, and…

Maintaining Personal Data Control Under the California Consumer Privacy Act

If you live in California or elsewhere in the United States, you may have heard of the California Consumer Privacy Act (CCPA). You might not…

How to be Agile and Resilient With Your Cybersafety Strategy

Picture a large and intricate spider’s web: hundreds of sticky threads, tightly and strategically woven into cross-hatched lines, poised to ensnare unsuspecting prey. Now picture…

How Sudos are Making Decentralized Identity Usable for Most People

Decentralized identity (also known as self-sovereign identity) is the future—and our secure digital identity, the Sudo, is opening up the possibility of decentralized identity for most…

How Sudo Digital Identities Protect Your Personal Identity

When an application, like a dating site, requests personal information from its users, it is in a good position to obtain (or supply to a…

What’s the Big Problem with Using Your Personal Identity Online?

Identity is an important part of what it means to be human. People commonly believe they have a single, consistent, and unique identity that makes…

What Constitutes Personally Identifiable Information or PII?

If you’re trying to protect something, it’s important to understand exactly what it is you’re trying to protect.  This is true of personally identifiable information…

How We Apply the 7 Principles of Privacy by Design

Achieving great privacy outcomes does not happen by chance. It requires thoughtful, informed design. Most importantly, privacy management demands an interdisciplinary, systems engineering approach because it spans:…

How Sudos Can Give You a Second Chance at Digital Privacy

Think about this: given the extent of the global data privacy crisis, your personal phone number and email address are probably already compromised beyond repair….

We Need to Verify Your Identity for MySudo Virtual Cards—Here’s Why

You’re probably wondering why a company that’s setting new standards in digital privacy asks for your personal information when setting up a MySudo virtual card….

MySudo Virtual Cards Are Here

Every time you go online, you leave a trail of personal information that data brokers and criminals can scoop up like candy.  Every purchase, every…

What Is Whale Phishing?

Much like spear phishing (which generally targets an individual), whale phishing is a strategic scam specifically aimed at a high-value, powerful, or prominent target. This…

Add Your Heading Text Here

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Add Your Heading Text Here

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Never Miss An Update

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.