11 subscribers
با برنامه Player FM !
پادکست هایی که ارزش شنیدن دارند
حمایت شده
How companies can go beyond end-to-end encryption
Manage episode 364164529 series 2769887
End-to-end encryption (E2EE) is increasingly mainstream, appearing in everything from mass-market instant messaging apps to high-end password managers.
But for E2EE to truly reach its potential, it needs to act as just one part of a secure IT infrastructure. And while more IT products than ever before claim to use end-to-end encryption to keep your data safe, many of these solutions also cut vital corners in their cryptography protocols — putting your information at risk.
In this special webinar podcast direct from ITsa365, Tresorit co-founder and CISO, Szilveszter Szebeni, talks to Encryption Europe’s James Briscoe about down the different types of encryption, how end-to-end encryption works, and what organizations need to be looking for in their secure IT solutions.
We’ll also be discussing why email as we know it today will never be secure, and the myth that easy-to-use products are more vulnerable to cyberattacks.
Find out more at www.tresorit.com
62 قسمت
Manage episode 364164529 series 2769887
End-to-end encryption (E2EE) is increasingly mainstream, appearing in everything from mass-market instant messaging apps to high-end password managers.
But for E2EE to truly reach its potential, it needs to act as just one part of a secure IT infrastructure. And while more IT products than ever before claim to use end-to-end encryption to keep your data safe, many of these solutions also cut vital corners in their cryptography protocols — putting your information at risk.
In this special webinar podcast direct from ITsa365, Tresorit co-founder and CISO, Szilveszter Szebeni, talks to Encryption Europe’s James Briscoe about down the different types of encryption, how end-to-end encryption works, and what organizations need to be looking for in their secure IT solutions.
We’ll also be discussing why email as we know it today will never be secure, and the myth that easy-to-use products are more vulnerable to cyberattacks.
Find out more at www.tresorit.com
62 قسمت
All episodes
×
1 Introducing Tresorit Engage – Secure, customizable workspaces for seamless client and partner collaboration 19:05

1 Überblick über das Webinar: Rechtskonform und wettbewerbsfähig bleiben: NIS2-Konformität für KMU im Unternehmens-Ökosystem 35:48


1 DORA: Are you late to the party? A critical review of the DORA requirements and the importance of being DORA compliant. 28:38

1 How SMEs can stay legal & efficient in the enterprise supplier network & pragmatically adopt NIS2 34:59
به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.