Category: Technology / Security
Proteus and MLS – How will secure communication change?
The rise in data breaches and cyber threats has made organizations increasingly aware of the need for more secure communication. With traditional communication methods such as regular cell service, email, instant messaging, or social media leaving sensitive information vulnerable, organizations want solutions that make privacy and security their prime concern. End-to-end encryption offers a solution […]
3 Ways to Build Trust into Technology
The full articles was written by our CEO Alan Duric and published on builtin.com on March 30, 2021 The recent implementation of privacy labels in Apple’s App Store have ignited a new wave of discussions over privacy concerns with technology applications. Users now have greater visibility into the type of data that is collected, who […]
What’s the Deal With Privacy in Enterprise Applications?
The full articles was published on Toolbox.com on February 25, 2021 Popular enterprise collaboration platforms help get the work done, but can their data collection policy result in a breach? Here, Wire’s Chief Revenue Officer Rasmus Holst provides a detailed overview of enterprise collaboration applications and the potential risks, along with ways to maintain security and privacy […]
The Three Things You Need To Shake Up Your Industry
An interview with our CTO and co-founder Alan Duric on disrupting industries. This article was originaly written by Jason Hartmann for Authority Magazine. Alan Duric is the co-founder and CTO/COO of Wire, a secure collaboration platform. He is an experienced entrepreneur with a strong background in real-time communications. He’s the co-founder and CTO of Telio […]
Three Principles for Security-First Architecture
Originally written by Wire co-founder and CTO Alan Duric for Red Hat. The COVID pandemic has pushed many companies to quickly digitize operations in order to support decentralized teams. Unfortunately, in the rush to provide these systems, many soon discovered that that ease of use, compatibility, and efficiency can come at a heavy cybersecurity cost. While […]