Episodes
The Network and Information Security Directive 2 (NIS2) is now in effect, and larger enterprises, affected by the regulation, are working hard on meeting its stringent requirements. But where does that leave smaller organizations in the supply chain? For SMEs, it's not just about meeting compliance mandates. Following NIS2 principles, even if not required by law, can offer a strategic advantage—boosting operational efficiency and making you a more attractive partner in the enterprise...
Published 11/11/24
Published 11/11/24
Whether you are working in the finance, healthcare, legal or manufacturing industries, sharing data with multiple external associates is part of your daily life. Fact. In a compliance focused-environment, how do you ensure you remain compliant and efficient whilst honoring the integrity of third-party data? Look no further, data rooms are here to save the day. We will look at the challenges of collaborating whilst adhering to strict data segregation requirements with Cyber Security expert...
Published 10/23/24
In this podcast, we will delve into the key elements of NIS2 and explore its far-reaching impact on organizations. Our experts will provide a comprehensive overview of the Directive and highlight the steps organizations need to take to achieve compliance.
Published 10/11/24
In this webinar we will explore the data security challenges faced by the financial industry and how finance organizations can improve productivity using collaborative tools.
Published 07/17/24
Learn how compliance can be a powerful driver of business growth. When digital rules and regulations seem to be increasing every day, it is easy to lose sight of the benefits that can be gained from living by them.
Published 06/20/24
Entdecken Sie die neuesten Updates aus der Entwicklungsabteilung von Tresorit und werfen Sie einen Blick auf die Roadmap für 2024.
Published 05/30/24
Discover the latest updates from Tresorit's R&D department and take a look at the roadmap for 2024.
Published 05/23/24
Many companies promise to offer robust E2EE, but under the hood, the level of protection may not live up to the promises.
Published 05/09/24
🛡️From phishing link victims to ransomware scenarios, we'll explore real-life data breach examples highlighting how harnessing your workforce can be your greatest fortification. Through these examples, we aim to provide tangible insights into the challenges faced by organizations and the strategies employed to mitigate risks effectively. Join our webinar, with Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity 🛡️
Published 03/14/24
Listen to Dr. Lisa McKee, Founding Partner at American Security & Privacy and Aaron Stillman, Tresorit’s Head of Product Marketing as they unravel the intricate relationship between zero trust and privacy.
Published 02/15/24
In a special joint episode, Tresorit is teaming up with secure messaging app Threema to discuss how businesses can prioritize communication both inside and outside the workplace. We’ll be looking at how encryption can usability can combine to create smooth and easy-to-use solutions, without exposing your organization to potential cyber risks.
Published 12/20/23
Threemas Elisabeth Rötsch und Tresorits Peter Stössel widmen sich dem Thema sichere Zusammenarbeit in Unternehmen. Im Mittelpunkt steht die Wichtigkeit der Sicherheit und Benutzerfreundlichkeit von Apps und Plattformen, um Cyberbedrohungen abzuwenden und Schatten-IT zu vermeiden. Einblicke in die Entstehungsgeschichte von Threema und Tresorit, die aktuelle Produktpalette und Kundenerfahrungen illustrieren, wie die Ende-zu-Ende-verschlüsselten Lösungen Unternehmen helfen, ihre Privatsphäre und...
Published 11/29/23
For many companies, complying with regulations such as GDPR and HIPAA is a legal requirement. But future-facing businesses can use compliance to their advantage to improve efficiency, increase competitiveness, and build trust with clients.
Published 11/16/23
It’s every security team’s nightmare scenario: a malicious cyberattack that puts valuable company assets at risk. But when the worst has already happened, what should come next? Cyber-resilience allows companies to quickly bounce back from digital events — and it has never been more vital for modern organizations.
Published 10/19/23
Non-profit organizations work directly with the world’s most vulnerable communities. But with shoestring budgets, how should NGOs protect important data from cyber threats that range from hostile state actors to accidental leaks?
Published 10/05/23
Es ist Zeit für Tresorits Rede zur Lage der Nation im Sommer 2023! Seien Sie dabei und erfahren Sie mehr über die neuesten Updates und Versionen des Unternehmens, einschließlich der Verbesserungen unserer e-Signatur-Lösung und der optimierten eigenständigen Dateifreigabe.
Published 09/14/23
It’s time for Tresorit’s State of the Union address for summer 2023! Join us to hear more about the company’s latest updates and releases, including improvements to our e-sign solution and streamlined standalone filesharing.
Published 08/10/23
Join human rights advocate Ethan Gutmann as he discusses how the right technology can protect whistle-blowers and witnesses in some of the world’s most oppressive regimes.
Published 07/13/23
Wir leben in einer Welt der unbegrenzten digitalen Möglichkeiten. Warum also halten so viele Verbraucher - und so viele Unternehmen - immer noch an unzuverlässigen analogen Geschäftsinstrumenten fest? Für viele ist die Antwort ganz einfach mangelndes Vertrauen: der Glaube, dass entweder Unternehmen oder ihre externen Partner ihre privaten oder sensiblen Daten nicht korrekt, ethisch korrekt und sicher behandeln werden. Infolgedessen haben sowohl Verbraucher als auch Unternehmen...
Published 06/08/23
End-to-end encryption (E2EE) is the best way to keep your personal data safe from prying eyes. But not every IT solution that uses E2EE truly delivers on its promise of security and transparency. Join Tresorit co-founder and CISO, Szilveszter Szebeni, as he delves into what businesses should be looking for in their E2EE solutions, and how the right tools can be used to minimize human error.
Published 05/24/23
More of us than ever before are choosing to work remotely. But blurring the line between home and the office also creates privacy risks that can be exploited by cybercriminals. In this episode, we talk to security consultant and private investigator Shannon Miller on how you can keep your home office safe from digital attacks.
Published 05/11/23