Press
Press Releases & News
Press
The Tradeoffs of “Free” Smartphone Apps and Big IT’s User Data Mining
Article courtesy of KoolSpan.com With the rise and near ubiquity of smartphones in today’s world, the need for secure communication has become even more pressing. Most encrypted messaging solutions in the market are targeted toward consumers and are free…
Randy Siegel on Information Week
Randy Siegel is the Founder of Center Circle Consultants, which focuses on US government mobility. He’s also a Principal in Acommence Advisors, a mobile advisory company. He spent more than a decade with Microsoft Corp. where he oversaw Microsoft’s mobility strategy and helped senior…
E-Discovery Mandates in Mobile Communications: Challenges and Compliance
The rapid proliferation of mobile devices has transformed the way we communicate and conduct business. As employees increasingly rely on personal smartphones, tablets, and messaging apps for work-related tasks, the legal landscape surrounding e-discovery…
Press Archives
Randy Siegel – Authors & Columnists – InformationWeek
Randy Siegel | FedTech Magazine
Randy Siegel | BizTech Magazine
Pushing for a modern, mobile federal government – The Mercury News
Final-2019-Mobile-White-Paper-1.pdf (atarc.org)
Microsoft to announce U.S. Census contract – MarketWatch
Census adopts Windows Mobile for field workers — GCN
Obama’s Black-Ops BlackBerry – WSJ
Ruckus Viewcast – The Future of Wireless (govexec.com)
Consumerization of IT and Its Affect on Government Mobility – FedScoop
Federal Government Mobility Veteran Randy Siegel Joins Purism
Purism is pleased to announce that long-time mobility industry insider Randy Siegel has joined the company to direct our strategic government business development efforts.
Known for his nuanced touch, deep relationships, and trustworthiness, Siegel has helped shape the complex federal mobile ecosystem with his well-honed understanding of government mission goals, requirements, and assessed outcomes.
My Blogs Featured on
purism.com
The Evolution of Smartphone Security
When smartphones first emerged in the early 2000s, the attack surface was relatively small. Devices were primarily used for Personal Information Management (PIM) such as calls, texts, email, calendaring, and basic internet browsing. However, the landscape…
Hardware Based Security For Government
When smartphones first emerged in the early 2000s, the attack surface was relatively small. Devices were primarily used for Personal Information Management (PIM) such as calls, texts, email, calendaring, and basic internet browsing. However…
A Secure Supply Chain and Your Privacy: Smartphone Components
Securing the Supply Chain A compromised component, whether it’s a backdoor in a chipset or a tainted software update, can unravel the entire security architecture of a device. It’s like a house with a gaping hole in the...