show episodes
 
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
  continue reading
 
Loading …
show series
 
Whether you are working in the finance, healthcare, legal or manufacturing industries, sharing data with multiple external associates is part of your daily life. Fact. In a compliance focused-environment, how do you ensure you remain compliant and efficient whilst honoring the integrity of third-party data?Look no further, data rooms are here to sa…
  continue reading
 
In this podcast, we will delve into the key elements of NIS2 and explore its far-reaching impact on organizations. Our experts will provide a comprehensive overview of the Directive and highlight the steps organizations need to take to achieve compliance. What you will learn: Understanding of the core objectives and requirements of NIS2, and which …
  continue reading
 
In this webinar we will explore the data security challenges faced by the financial industry and how finance organizations can improve productivity using collaborative tools. What you will learn: Pitfalls and challenges to avoid when ensuring data security in the Finance industry How Finance professionals can save valuable time and resources while …
  continue reading
 
Learn how compliance can be a powerful driver of business growth. When digital rules and regulations seem to be increasing every day, it is easy to lose sight of the benefits that can be gained from living by them. See by Bavo Van den Heuvel, CEO of Cranium, share how compliance can elevate your brand and drive revenue, streamline processes, and bo…
  continue reading
 
Join our webinar, with Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity, where we will have a look at the critical junction of security and productivity with examples from Sjoerd’s broad experience helping companies fortify their security infrastructure.🛡️ From phishing link victims to ransomware scenarios, we'll explore real-life data bre…
  continue reading
 
🔒 Listen to Dr. Lisa McKee, Founding Partner at American Security & Privacy and Aaron Stillman, Tresorit’s Head of Product Marketing as they unravel the intricate relationship between zero trust and privacy. 🛡️ In this episode you’ll learn: Steps to take when reviewing your data strategies Common mistakes to avoid while working with data How to imp…
  continue reading
 
In this episode of Under CTRL, Tresorit’s Chief Revenue Officer, Peter Stössel, is joined by Elisabeth Rötsch, an account executive for secure messaging app Threema. They’ll be discussing why secure communication should be a top priority for modern workforces, and how digitization can improve connectivity for global businesses. The episode will als…
  continue reading
 
Wie kann Ihr Unternehmen die Sicherheit und Privatsphäre seiner Daten in Übereinstimmung mit aktuellen Datenschutzbestimmungen gewährleisten, ohne seinen Mitarbeitern das Leben – und die interne und externe Zusammenarbeit – schwer zu machen? In dieser gemeinschaftlich von Threema.Work und Tresorit produzierten Podcast-Episode erhalten Sie die Antwo…
  continue reading
 
Join Péter Budai, Tresoit’s Chief Product Officer, as he breaks down the data compliance landscape in Europe and the United States and looks at how firms can get the most from their data protection policies. Initially, compliance can seem daunting. But taking the time to evaluate your company’s digital infrastructure isn’t just about managing poten…
  continue reading
 
In this episode of Under CTRL, Tresorit’s Chief Technology Officer, Péter Budai, joins ICA Consultancy’s Ben De La Salle to discuss how organizations can not only withstand cyberattacks, but also recover from them. For truly resilient companies, cyber security isn’t just seen as an IT issue, but as everyone’s responsibility. That’s because the fall…
  continue reading
 
In this episode of Under CTRL, Tresorit’s Aaron Stillman talks with Jason Keller, digital strategy developer for Vistant, and James Eaton-Lee, CISO for NetHope, on how NGOs can protect their most important assets in the online age. Non-profits are often used to working in demanding environments, but they also face unique challenges in the digital r…
  continue reading
 
Bei Tresorit arbeiten wir ständig hinter den Kulissen an den Funktionen und Lösungen, die Ihre persönlichen Daten schützen. Und da die meisten unserer Verbesserungen auf das Feedback unserer Kunden zurückgehen, stellen wir sicher, dass unsere Nutzer bei der Vorstellung unserer neuesten Updates einen Platz in der ersten Reihe erhalten. Wie immer in …
  continue reading
 
At Tresorit, we’re always working behind the scenes on the features and solutions that keep your personal data safe. And as most of our improvements are driven by customer feedback, we make sure our users get a front-row seat as we unveil our latest updates. As always in our State of the Union webinars, we’ll be diving into the latest Tresorit rele…
  continue reading
 
Across the globe, governments are using cutting-edge technology to surveil their citizens en masse. In oppressive or autocratic regimes, state security services regularly exploit tools such as facial recognition and GPS tracking to find and imprison political dissidents. Luckily, digital innovation is also unlocking new possibilities for human righ…
  continue reading
 
Vertrauen ist das Herzstück produktiver Geschäftsbeziehungen. Doch die Verbraucher zögern oft, ihr Vertrauen in die digitalen Technologien zu setzen, die moderne und bahnbrechende Unternehmen vorantreiben. In dieser Folge setzt sich Stefan Killer-Haug von Tresorit mit Nicolas Zahn von der Swiss Digital Initiative zusammen, um über die Besonderheite…
  continue reading
 
End-to-end encryption (E2EE) is increasingly mainstream, appearing in everything from mass-market instant messaging apps to high-end password managers. But for E2EE to truly reach its potential, it needs to act as just one part of a secure IT infrastructure. And while more IT products than ever before claim to use end-to-end encryption to keep your…
  continue reading
 
In this episode, Tresorit’s Stefan Killer-Haug joins security consultant and private investigator Shannon Miller to discuss the importance of cybersecurity for remote workers and how to your data safe while working from home. The popularity of flexible and hybrid working has exploded in recent years — and if you’re one of the many who has swapped t…
  continue reading
 
In this podcast episode, Stefan Killer-Haug, Tresorit's representative, and Diana Kaliff, product lead for Swiss Digital Initiative, discussed the importance of digital trust and certifications. They talked about the Swiss Digital Trust label launched in 2022, the importance of building trust online as well as in the physical world, having a user-c…
  continue reading
 
Tresorit becomes the platform to store sensitive documents, share confidential files and sign all types of business-critical agreements. In this episode you will meet Tresorit eSign, the simple, secure e-signature solution to sign all your confidential documents.Find out more at www.tresorit.comBy Böbe Hartung-Marjai, Tamás Molnár
  continue reading
 
In this webinar, you'll learn: What are the challenges of remote and hybrid ways of working How to safeguard your digital business interactions by means of end-to-end encryption Why Tresorit is a great service for secure file sharing and email Why 7,000 companies have opted for Threema secure messaging Reduce the risks of sharing information with p…
  continue reading
 
You’ll learn: Why encrypting emails should be top of your list to protect business data How to secure your hybrid workspace with email encryption How to easily integrate secure emailing to your existing workflows Reduce the risks of sharing information with peers, clients and other external parties. Find out more at www.tresorit.com…
  continue reading
 
The current cyberspace landscape is a reflection of the world's social, political, and economic phenomena, mirroring the social inequality, discrimination and privacy violations that occur in society (and, in many cases, amplifying them). In our next podcast episode, we’ll dive deeper into these issues with celebrated human rights defender, hacker,…
  continue reading
 
The myriad routines connected to them have made smartphones essential tools in our work and private lives. These days, mobile devices account for over half of global web traffic. Unsurprisingly, cybercriminals have also set their sights on this goldmine of data. Consumers and organizations alike have seen a surge in attacks on mobile devices due to…
  continue reading
 
Rapid innovation should be counterbalanced by sensible security measures to protect our lives in the virtual space and, so far, encryption has proved to incredibly useful in doing just that. Encryption is after all the through-line of our daily digital routines, and is present (or should be present) in every message, transaction and video call you …
  continue reading
 
Some associate airports with the excitement of travel, others think of them as transit points for business travel. However you view them, airports need to operate like clockwork and everyone – from employees to passengers – must follow a carefully controlled script. That said, we rarely take the time to reflect on the complex processes that guide t…
  continue reading
 
In our highly interconnected world, data is the fuel that keeps the digital economy up and running. Companies and platforms of all shapes and sizes are collecting, sharing and selling the personal information of their users without explicit consent to do so. We believe it’s time to regain ownership of your data by removing your private information …
  continue reading
 
The security of the New World we are building online is heavily dependent on password security but, despite this, password reuse and negligence continue to be a problem for the world’s Web users. This lax approach has created the ideal environment for hackers to thrive, as leaked credentials become replicated across the clean and dark web. To help …
  continue reading
 
2020: the year of the cyberattack – and the year that security services levelled up to combat this growing threat. Today on under CTRL, we’re joined by Laszlo Borsy - cybersecurity advocate and VP of Business Development at White Shark, a managed security services company based out of our hometown Budapest. White Shark represents a new breed of sec…
  continue reading
 
Going online can expose children to new risks from cyberbullying, online predators, self-harm to uncensored content and targeted ads. The traditional protections we place around children are no longer effective in cyberspace, but can an app really help to prevent harmful situations both online and offline? Today, under CTRL is joined by Bark's Chie…
  continue reading
 
Luke describes Brave as a “privacy browser with the first kind of integrated global private ad and reward platform”. By blocking trackers that allow platforms to create detailed audience profiles, Brave provides users with a “real clean start” and a browser experience that’s 3 times faster than Google. Having started his career in advertising, Luke…
  continue reading
 
Our search engine knows often more about us than our best friends – thanks to the data trails we leave as we are seeking answers to common and sensitive questions across the web. Is there a real choice, a private alternative for online search and navigation, without dismantling the boundaries of our privacy? The answer is clearly and reassuringly: …
  continue reading
 
Phil Zimmermann creator of Pretty Good Privacy and Co-Founder of SilentCircle and István Lám, CEO of Tresorit discuss the recent press report from EU - "Draft Council Resolution on Encryption". Why are the five Eyes putting forward a proposal to expand “targeted lawful access” and what potential impact will this have on privacy? Is there a potentia…
  continue reading
 
How can "machine learning" tell if a goverment ID is genuine or fake? How does Revolut and other neobanks benefit from such services? How does Onfido support airport check-ins in parallel with connecting COVID19 test results to your digital identity? CEO and Co-Founder of Onfido, Husayn Kassai will shed light on these topics. You can find todays gu…
  continue reading
 
How do Pharma companies handle ultra sensitive data whilst some of the largest companies are racing to develop COVID-19 vaccination? CTO and Data Protection Officer of Adamas Consulting Group, Matt Barthel sheds some light on this complex matter. We discuss clinical trials, data security and compliance within this highly regulated industry and touc…
  continue reading
 
In a world monopolised by tech giants, where data is being constantly abused and manipulated by corporations and governments alike - how does privacy and freedom of speech survive? We chat about everything from surveillance capitalism to regulations with Edward Shone, the PR Manager of ProtonMail. You can find todays guest on https://www.linkedin.c…
  continue reading
 
Come along with us as we venture into the exclusive world of VIPs and discuss what physical and cybersecurity means to high-end clients. Walking us through the challenges of providing the highest levels of safety and privacy to a global customer base is Maria Olshanskaya, Co-Founder and Active Partner of Tel Aviv’s Aera Global Corp. You can find to…
  continue reading
 
With the Schrems 2 ruling finalized in July, how will enterprise data protection be affected? What is the future of the EU-US Privacy Shield? We chat with Jitty van Doodewaerd from DMCC who was formerly part of the Big Data Expert Group of the Dutch Ministry of Economic Affairs. You can find todays guest on https://www.linkedin.com/in/jitty-van-doo…
  continue reading
 
Join us as we sail off into the sea to discuss how human-centric roles such as hospitality, and different generations all successfully coexist with technology and data security. Helping us navigate the waters is Hornblower Cruises and Events HR manager Codi Robbins from California. You can find todays guest on https://www.linkedin.com/in/codirobbin…
  continue reading
 
Loading …

Quick Reference Guide