<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=805153362943600&amp;ev=PageView&amp;noscript=1">

Download Whitepaper

Get a detailed overview of our solutions for secure communications.

Download
CTA-Solutions-Overview-Mockup

Find Out More About SGMM

Visit our Wiki to understand more about our Management Model and how we do things through our unique way of working.

Visit Wiki
How to make sense of encryption protocols
Cybersecurity

How to make sense of encryption protocols

BlueBorne hack proves how easy it is to exploit Bluetooth
Cybersecurity

BlueBorne hack proves how easy it is to exploit Bluetooth

6 ways your phone can get hacked
Cybersecurity

6 ways your phone can get hacked

Fixing SS7 vulnerabilities: What is being done and what you can do
Cybersecurity

Fixing SS7 vulnerabilities: What is being done and what you can do

Phone hacking through SS7 is frighteningly easy and effective
Cybersecurity

Phone hacking through SS7 is frighteningly easy and effective

What does the Lipizzan spyware mean for mobile communication security?
Cybersecurity

What does the Lipizzan spyware mean for mobile communication security?

Hackers use hotel wi-fi to spy on targets, doesn't work on Secure Phone
Cybersecurity

Hackers use hotel wi-fi to spy on targets, doesn't work on Secure Phone

Why industries need to secure their communications
Cybersecurity

Why industries need to secure their communications

Why encryption and mobile security are fundamental for human rights
Cybersecurity

Why encryption and mobile security are fundamental for human rights

How instant connectivity and encryption help the energy sector secure its communications
Cybersecurity

How instant connectivity and encryption help the energy sector secure its communications

How encrypted communication solutions help the consulting and accounting sector
Cybersecurity

How encrypted communication solutions help the consulting and accounting sector

Secure communications to help prevent banking and financial fraud
Cybersecurity

Secure communications to help prevent banking and financial fraud

Securing the pharmaceutical industry’s R&D data: How we do it
Cybersecurity

Securing the pharmaceutical industry’s R&D data: How we do it

How vulnerabilities in SS7 protocol expose all mobile networks to attacks
Cybersecurity

How vulnerabilities in SS7 protocol expose all mobile networks to attacks

Your PIN is very easy to steal. Here is how we keep it safe
Cybersecurity

Your PIN is very easy to steal. Here is how we keep it safe

Why online privacy matters – and how to take it back
Cybersecurity

Why online privacy matters – and how to take it back

6 encryption workarounds (that don’t work on our products)
Cybersecurity

6 encryption workarounds (that don’t work on our products)

IMSI-catchers: What they are, why you should be concerned and how to protect yourself?
Cybersecurity

IMSI-catchers: What they are, why you should be concerned and how to protect yourself?

Want to erase everything on your phone? A factory reset won’t do it
Cybersecurity

Want to erase everything on your phone? A factory reset won’t do it

How being 100% P2P helps Secure Chat guarantee its users' privacy
Cybersecurity

How being 100% P2P helps Secure Chat guarantee its users' privacy

Device encryption and remote wipe: How Secure Phone keeps your data safe
Cybersecurity

Device encryption and remote wipe: How Secure Phone keeps your data safe

Secure Group doesn’t store user encryption keys. Here’s why
Cybersecurity

Secure Group doesn’t store user encryption keys. Here’s why

Why the CIA leaks confirm what we have been saying all along
Cybersecurity

Why the CIA leaks confirm what we have been saying all along

SHA-1 algorithm officially dead, Secure Chat not compromised
Cybersecurity

SHA-1 algorithm officially dead, Secure Chat not compromised

Reducing the attack surface: Why less is more in smartphone security
Cybersecurity

Reducing the attack surface: Why less is more in smartphone security

How data leaks from your smartphone – and can you stop it?
Cybersecurity

How data leaks from your smartphone – and can you stop it?

Google Services and privacy don't mix: How we removed them from Secure Phone
Cybersecurity

Google Services and privacy don't mix: How we removed them from Secure Phone

How not to get hacked: 15 tips to improve your online security
Cybersecurity

How not to get hacked: 15 tips to improve your online security

Lock pattern, PIN, or password: What is the most reliable way to lock a phone?
Cybersecurity

Lock pattern, PIN, or password: What is the most reliable way to lock a phone?

A backdoor or not, there is a vulnerability in WhatsApp. Here’s why
Cybersecurity

A backdoor or not, there is a vulnerability in WhatsApp. Here’s why

The Socialist Millionaire Protocol: How Secure Chat prevents MitM attacks
Cybersecurity

The Socialist Millionaire Protocol: How Secure Chat prevents MitM attacks

Passwords: How to come up with strong ones? (And why yours suck)
Cybersecurity

Passwords: How to come up with strong ones? (And why yours suck)

Cold War 2.0 is going to be all about cyberwarfare. Buckle up for it in 2017
Cybersecurity

Cold War 2.0 is going to be all about cyberwarfare. Buckle up for it in 2017

What to look for when choosing an encrypted communications provider?
Cybersecurity

What to look for when choosing an encrypted communications provider?

To PGP, or not to PGP? That is the question
Cybersecurity

To PGP, or not to PGP? That is the question

How much is your stolen information worth?
Cybersecurity

How much is your stolen information worth?

8 things that threaten mobile security
Cybersecurity

8 things that threaten mobile security

Why having encryption backdoors is a very bad idea?
Cybersecurity

Why having encryption backdoors is a very bad idea?

Malicious apps spy on you and steal your data. How can you stop them?
Cybersecurity

Malicious apps spy on you and steal your data. How can you stop them?

Why Samsung Knox security isn’t good enough? (Part 2)
Cybersecurity

Why Samsung Knox security isn’t good enough? (Part 2)

9 reasons why everyone needs encryption
Cybersecurity

9 reasons why everyone needs encryption

Does quantum computing mean the end of encryption? Not yet
Cybersecurity

Does quantum computing mean the end of encryption? Not yet

Is there a tide of mass surveillance rising? Here’s how to prepare
Cybersecurity

Is there a tide of mass surveillance rising? Here’s how to prepare

How to avoid privacy threats when using free Wi-Fi
Cybersecurity

How to avoid privacy threats when using free Wi-Fi

Do you rely on Samsung Knox for security? Here’s why you shouldn’t
Cybersecurity

Do you rely on Samsung Knox for security? Here’s why you shouldn’t

How to reclaim your online privacy in 5 practical steps
Cybersecurity

How to reclaim your online privacy in 5 practical steps

Why a Trump presidency could mean bad news for online privacy
Cybersecurity

Why a Trump presidency could mean bad news for online privacy

Wi-Fi IMSI-catchers: Another reason to avoid free hotspots
Cybersecurity

Wi-Fi IMSI-catchers: Another reason to avoid free hotspots

Eavesdropping on what you type: How keystroke sounds may give away your password
Cybersecurity

Eavesdropping on what you type: How keystroke sounds may give away your password

Did the NSA really break Diffie-Hellman? Not quite
Cybersecurity

Did the NSA really break Diffie-Hellman? Not quite

Your everyday messaging app, human rights, and online privacy? Not a match made in heaven
Cybersecurity

Your everyday messaging app, human rights, and online privacy? Not a match made in heaven

Android malware on steroids: DressCode
Cybersecurity

Android malware on steroids: DressCode

Is encryption a crime? Scotland Yard says yes, and it's so wrong
Cybersecurity

Is encryption a crime? Scotland Yard says yes, and it's so wrong

New backdoor in Android discovered! Secure Phone is not affected
Cybersecurity

New backdoor in Android discovered! Secure Phone is not affected

Because of you, your phone is your weakness
Cybersecurity

Because of you, your phone is your weakness

You can escape Yahoo but can you escape mass email surveillance?
Cybersecurity

You can escape Yahoo but can you escape mass email surveillance?

10 privacy organizations oppose UK's mass surveillance in court
Cybersecurity

10 privacy organizations oppose UK's mass surveillance in court

What will generic phones mean for BlackBerry security
Cybersecurity

What will generic phones mean for BlackBerry security

Is someone spying on my cell phone? 3 Secure Phone features make it impossible
Cybersecurity

Is someone spying on my cell phone? 3 Secure Phone features make it impossible

How to hack an iPhone for $100, or how the FBI could've saved $1 mln
Cybersecurity

How to hack an iPhone for $100, or how the FBI could've saved $1 mln

Secure Pack vs Secure Phone: the key differences
Cybersecurity

Secure Pack vs Secure Phone: the key differences

ZRTP encryption for voice explained
Cybersecurity

ZRTP encryption for voice explained

OTR encryption for chat explained
Cybersecurity

OTR encryption for chat explained

PGP encryption for email explained
Cybersecurity

PGP encryption for email explained

End-to-end encryption vs link encryption
Cybersecurity

End-to-end encryption vs link encryption

What is encryption? Here's the real answer.
Cybersecurity

What is encryption? Here's the real answer.

Google user data requests hit a new record. Can encryption help privacy?
Cybersecurity

Google user data requests hit a new record. Can encryption help privacy?

Mobile device management & the risks of BYOD
Cybersecurity

Mobile device management & the risks of BYOD

How prepared are you for phone theft or loss? Find out now!
Cybersecurity

How prepared are you for phone theft or loss? Find out now!

Why master keys suck? The TSA locks hack is a great example
Cybersecurity

Why master keys suck? The TSA locks hack is a great example

The terrifying future (present) of biometrics
Cybersecurity

The terrifying future (present) of biometrics

BIGGEST privacy concerns: DRONES (part 3)
Cybersecurity

BIGGEST privacy concerns: DRONES (part 3)

BIGGEST privacy concerns: ENVIRONMENTAL SURVEILLANCE (part 2)
Cybersecurity

BIGGEST privacy concerns: ENVIRONMENTAL SURVEILLANCE (part 2)

BIGGEST privacy concerns: MOBILE DEVICES (part 1)
Cybersecurity

BIGGEST privacy concerns: MOBILE DEVICES (part 1)

How Android encryption can be broken and how Secure Phone beats the hack
Cybersecurity

How Android encryption can be broken and how Secure Phone beats the hack

Social engineering, or turning human nature against us
Cybersecurity

Social engineering, or turning human nature against us

Top 10 reasons why BYOD may not be right for you
Cybersecurity

Top 10 reasons why BYOD may not be right for you

Top 3 misconceptions on Android security
Cybersecurity

Top 3 misconceptions on Android security

Was data about you stolen in 2015? Over half a billion records were...
Cybersecurity

Was data about you stolen in 2015? Over half a billion records were...

Security and Privacy Roundup Oct. 15
Cybersecurity

Security and Privacy Roundup Oct. 15

Security and Privacy Roundup, September 18th
Cybersecurity

Security and Privacy Roundup, September 18th

Security and Privacy Roundup, August 31st
Cybersecurity

Security and Privacy Roundup, August 31st

Update on Stagefright, and new vulnerabilities discovered
Cybersecurity

Update on Stagefright, and new vulnerabilities discovered

Security and Privacy Roundup, August 15th
Cybersecurity

Security and Privacy Roundup, August 15th

Security and Privacy for the Legal Profession
Cybersecurity

Security and Privacy for the Legal Profession

Encrypted Phone Blackphone HACKED! The HOW and WHY
Cybersecurity

Encrypted Phone Blackphone HACKED! The HOW and WHY

Encrypted PGP Email: Google's Phony Attempt
Cybersecurity

Encrypted PGP Email: Google's Phony Attempt

How the Government Tracks You: NSA Surveillance
Cybersecurity

How the Government Tracks You: NSA Surveillance

Email Encryption Vs Race car, Can we compare them ?
Cybersecurity

Email Encryption Vs Race car, Can we compare them ?

Secure Voice promises you to keep your Phone Calls #Encrypted and #secure
Cybersecurity

Secure Voice promises you to keep your Phone Calls #Encrypted and #secure

Secure Chat promises you to keep your text messages #private and #secure
Cybersecurity

Secure Chat promises you to keep your text messages #private and #secure

Entrepreneurship: Privacy Has Monetary Value – It’s One Of Few Things We Pay For Online
Cybersecurity

Entrepreneurship: Privacy Has Monetary Value – It’s One Of Few Things We Pay For Online