How can companies protect themselves and their employees against hacking?
Time to read:
3 min
After private data belonging to politicians and public figures was published online in December 2018, we did not have to wait long for new security [...] Read more
What corporations need to learn from the cyber-attack on politicians and celebrities
Time to read:
3 min
Since the 2018/19 cyber-attack on public figures, IT security is once again a hot topic in Germany. A 20-year-old man posted the personal contact details [...] Read more
Are my TLS-encrypted emails EU GDPR compliant?
Time to read:
3 min
Spontaneously encrypting with TLS only works to a certain degree. There is a high risk of not encrypting, even though you believe your email is TLS-encrypted. Read more
What does Efail mean for companies?
Time to read:
3 min
After the first wave of misinformation, it should have meanwhile spread that the email encryption has not been cracked by the security gap Efail. Read more
What is the difference between certificate signatures and email signatures?
Time to read:
2 min
Signatures play a very important role in cryptography. Do you know the difference between the signature of a certificate and the signature of an email? Read more
Encrypted emails safeguard lawyers’ confidentiality obligation
Time to read:
3 min
Lawyers are subject to special secrecy obligations. The law firm WSL Patentanwälte protects its client data with a central email encryption solution. Read more
What the EU Trade Secret Directive means for your IT security
Time to read:
2 min
Business secrets are the foundation of the success of many companies. What does the EU know-how protection directive mean in this context? Read more
To make long-term savings through electronic invoicing means preventing manipulation
Time to read:
2 min
Since 2011, invoices may also be sent electronically. This offers great potential for savings, but also new dangers such as man-in-the-middle attacks. Read more
Email encryption for recipients without certificates
Time to read:
4 min
Not every email address can find a valid certificate. But not all alternative delivery methods are recommended. Read more
Why proprietary encryption solutions are not the safest bet
Time to read:
2 min
There are providers who develop their own encryption techniques. Trust in these security measures is not always justified. Read more