
Unencrypted emails endanger companies – especially during the pandemic
Time to read:
3 min
Restrictions in public life in the wake of the pandemic have led to a surge in digitization in many areas. At the same time, criminals are using the [...] Read more

4 Benefits of Shorter X.509 Validity Periods for Web and Email Certificates
Time to read:
3 min
Email certificates for S/MIME encrypted communication use the same technical standard as browser certificates. Both are X.509 certificates with different [...] Read more

Intercepted emails in times of big data – the underestimated threat
Time to read:
2 min
Nearly daily news of cyber attacks on companies reaches us. Hackers obtain access to internal networks. What about sensitive data that is transferred via [...] Read more

Are published email certificates subject to EU GDPR?
Time to read:
3 min
In business communications, certificate-based email encryption using S/MIME or OpenPGP is common practice. An employee’s email certificate contains, among [...] Read more

Corporations require a different approach to IT security than private users
Time to read:
2 min
In reaction to the cyber-attack on politicians and celebrities at the turn of the year, everyone is recommending email encryption direct in your email [...] Read more

How can companies protect themselves and their employees against hacking?
Time to read:
3 min
After private data belonging to politicians and public figures was published online in December 2018, we did not have to wait long for new security [...] Read more

What corporations need to learn from the cyber-attack on politicians and celebrities
Time to read:
3 min
Since the 2018/19 cyber-attack on public figures, IT security is once again a hot topic in Germany. A 20-year-old man posted the personal contact details [...] Read more

What is the difference between certificate signatures and email signatures?
Time to read:
2 min
Signatures play a very important role in cryptography. Do you know the difference between the signature of a certificate and the signature of an email? Read more

Encrypted emails safeguard lawyers’ confidentiality obligation
Time to read:
3 min
Lawyers are subject to special secrecy obligations. The law firm WSL Patentanwälte protects its client data with a central email encryption solution. Read more

To make long-term savings through electronic invoicing means preventing manipulation
Time to read:
2 min
Since 2011, invoices may also be sent electronically. This offers great potential for savings, but also new dangers such as man-in-the-middle attacks. Read more