
What is the difference between certificate signatures and email signatures?
Time to read:
2 min
Signatures play a very important role in cryptography. Do you know the difference between the signature of a certificate and the signature of an email? Read more

Encrypted emails safeguard lawyers’ confidentiality obligation
Time to read:
3 min
Lawyers are subject to special secrecy obligations. The law firm WSL Patentanwälte protects its client data with a central email encryption solution. Read more

What the EU Trade Secret Directive means for your IT security
Time to read:
2 min
Business secrets are the foundation of the success of many companies. What does the EU know-how protection directive mean in this context? Read more

To make long-term savings through electronic invoicing means preventing manipulation
Time to read:
2 min
Since 2011, invoices may also be sent electronically. This offers great potential for savings, but also new dangers such as man-in-the-middle attacks. Read more

Email encryption for recipients without certificates
Time to read:
4 min
Not every email address can find a valid certificate. But not all alternative delivery methods are recommended. Read more

Why proprietary encryption solutions are not the safest bet
Time to read:
2 min
There are providers who develop their own encryption techniques. Trust in these security measures is not always justified. Read more

Business Challenge:
fast and secure large file transfer
Time to read:
2 min
It is not possible to transfer Data larger than 10 MB via email. For that kind of transfer are other solutions needed. Read more

Recommendations for email encryption when doing international business
Time to read:
2 min
Many companies are communicating worldwide. Not encrypted confidential information could get intercepted and manipulated. Read more
-
«
Page 4 of 4
»