Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
…
continue reading
1
Working together and keeping data apart: unlocking the power of Data Rooms
32:18
32:18
Play later
Play later
Lists
Like
Liked
32:18
Whether you are working in the finance, healthcare, legal or manufacturing industries, sharing data with multiple external associates is part of your daily life. Fact. In a compliance focused-environment, how do you ensure you remain compliant and efficient whilst honoring the integrity of third-party data?Look no further, data rooms are here to sa…
…
continue reading
1
What you need to know about NIS2 and how to prepare
30:36
30:36
Play later
Play later
Lists
Like
Liked
30:36
In this podcast, we will delve into the key elements of NIS2 and explore its far-reaching impact on organizations. Our experts will provide a comprehensive overview of the Directive and highlight the steps organizations need to take to achieve compliance. What you will learn: Understanding of the core objectives and requirements of NIS2, and which …
…
continue reading
1
Data Security Strategies for the Finance Industry
36:04
36:04
Play later
Play later
Lists
Like
Liked
36:04
In this webinar we will explore the data security challenges faced by the financial industry and how finance organizations can improve productivity using collaborative tools. What you will learn: Pitfalls and challenges to avoid when ensuring data security in the Finance industry How Finance professionals can save valuable time and resources while …
…
continue reading
Learn how compliance can be a powerful driver of business growth. When digital rules and regulations seem to be increasing every day, it is easy to lose sight of the benefits that can be gained from living by them. See by Bavo Van den Heuvel, CEO of Cranium, share how compliance can elevate your brand and drive revenue, streamline processes, and bo…
…
continue reading
1
Neue Funktionen von Tresorit (Spring Updates, 2024)
26:55
26:55
Play later
Play later
Lists
Like
Liked
26:55
Entdecken Sie die neuesten Updates aus der Entwicklungsabteilung von Tresorit und werfen Sie einen Blick auf die Roadmap für 2024. Find out more at www.tresorit.comBy Tresorit
…
continue reading
1
New Features and Functions of Tresorit (Spring Updates, 2024)
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42
Discover the latest updates from Tresorit's R&D department and take a look at the roadmap for 2024. Find out more at www.tresorit.comBy Tresorit
…
continue reading
1
IT Security: How encryption can protect - and deceive you
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27
Many companies promise to offer robust E2EE, but under the hood, the level of protection may not live up to the promises.Find out more at www.tresorit.comBy Tresorit
…
continue reading
Find out more at www.tresorit.comBy Tresorit
…
continue reading
1
How to fortify your security with your workforce
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10
Join our webinar, with Sjoerd van den Bedem, IT Manager, Northwave Cybersecurity, where we will have a look at the critical junction of security and productivity with examples from Sjoerd’s broad experience helping companies fortify their security infrastructure.🛡️ From phishing link victims to ransomware scenarios, we'll explore real-life data bre…
…
continue reading
1
Dive into Cybersecurity: Zero Trust Privacy
43:20
43:20
Play later
Play later
Lists
Like
Liked
43:20
🔒 Listen to Dr. Lisa McKee, Founding Partner at American Security & Privacy and Aaron Stillman, Tresorit’s Head of Product Marketing as they unravel the intricate relationship between zero trust and privacy. 🛡️ In this episode you’ll learn: Steps to take when reviewing your data strategies Common mistakes to avoid while working with data How to imp…
…
continue reading
1
Tresorit Winter-Updates und Jahresrückblick Beschreibung
30:07
30:07
Play later
Play later
Lists
Like
Liked
30:07
Find out more at www.tresorit.comBy Renáta Bárdos, Peter Stössel
…
continue reading
1
Tresorit Winter updates and year ahead review
47:31
47:31
Play later
Play later
Lists
Like
Liked
47:31
Find out more at www.tresorit.comBy Tresorit
…
continue reading
1
Keeping workplace collaboration cybersecure
24:45
24:45
Play later
Play later
Lists
Like
Liked
24:45
In this episode of Under CTRL, Tresorit’s Chief Revenue Officer, Peter Stössel, is joined by Elisabeth Rötsch, an account executive for secure messaging app Threema. They’ll be discussing why secure communication should be a top priority for modern workforces, and how digitization can improve connectivity for global businesses. The episode will als…
…
continue reading
1
Sicherheit und Benutzerfreundlichkeit in Harmonie
25:38
25:38
Play later
Play later
Lists
Like
Liked
25:38
Wie kann Ihr Unternehmen die Sicherheit und Privatsphäre seiner Daten in Übereinstimmung mit aktuellen Datenschutzbestimmungen gewährleisten, ohne seinen Mitarbeitern das Leben – und die interne und externe Zusammenarbeit – schwer zu machen? In dieser gemeinschaftlich von Threema.Work und Tresorit produzierten Podcast-Episode erhalten Sie die Antwo…
…
continue reading
Join Péter Budai, Tresoit’s Chief Product Officer, as he breaks down the data compliance landscape in Europe and the United States and looks at how firms can get the most from their data protection policies. Initially, compliance can seem daunting. But taking the time to evaluate your company’s digital infrastructure isn’t just about managing poten…
…
continue reading
1
How to build businesses’ cyber-resilience
51:52
51:52
Play later
Play later
Lists
Like
Liked
51:52
In this episode of Under CTRL, Tresorit’s Chief Technology Officer, Péter Budai, joins ICA Consultancy’s Ben De La Salle to discuss how organizations can not only withstand cyberattacks, but also recover from them. For truly resilient companies, cyber security isn’t just seen as an IT issue, but as everyone’s responsibility. That’s because the fall…
…
continue reading
In this episode of Under CTRL, Tresorit’s Aaron Stillman talks with Jason Keller, digital strategy developer for Vistant, and James Eaton-Lee, CISO for NetHope, on how NGOs can protect their most important assets in the online age. Non-profits are often used to working in demanding environments, but they also face unique challenges in the digital r…
…
continue reading
1
State of the Union: Tresorits aktuelle Features für Sommer 2023
32:41
32:41
Play later
Play later
Lists
Like
Liked
32:41
Bei Tresorit arbeiten wir ständig hinter den Kulissen an den Funktionen und Lösungen, die Ihre persönlichen Daten schützen. Und da die meisten unserer Verbesserungen auf das Feedback unserer Kunden zurückgehen, stellen wir sicher, dass unsere Nutzer bei der Vorstellung unserer neuesten Updates einen Platz in der ersten Reihe erhalten. Wie immer in …
…
continue reading
1
State of the Union: what’s next for Tresorit in 2023
31:36
31:36
Play later
Play later
Lists
Like
Liked
31:36
At Tresorit, we’re always working behind the scenes on the features and solutions that keep your personal data safe. And as most of our improvements are driven by customer feedback, we make sure our users get a front-row seat as we unveil our latest updates. As always in our State of the Union webinars, we’ll be diving into the latest Tresorit rele…
…
continue reading
1
When data privacy means life or death, with Ethan Gutmann
1:27:17
1:27:17
Play later
Play later
Lists
Like
Liked
1:27:17
Across the globe, governments are using cutting-edge technology to surveil their citizens en masse. In oppressive or autocratic regimes, state security services regularly exploit tools such as facial recognition and GPS tracking to find and imprison political dissidents. Luckily, digital innovation is also unlocking new possibilities for human righ…
…
continue reading
Vertrauen ist das Herzstück produktiver Geschäftsbeziehungen. Doch die Verbraucher zögern oft, ihr Vertrauen in die digitalen Technologien zu setzen, die moderne und bahnbrechende Unternehmen vorantreiben. In dieser Folge setzt sich Stefan Killer-Haug von Tresorit mit Nicolas Zahn von der Swiss Digital Initiative zusammen, um über die Besonderheite…
…
continue reading
1
How companies can go beyond end-to-end encryption
31:17
31:17
Play later
Play later
Lists
Like
Liked
31:17
End-to-end encryption (E2EE) is increasingly mainstream, appearing in everything from mass-market instant messaging apps to high-end password managers. But for E2EE to truly reach its potential, it needs to act as just one part of a secure IT infrastructure. And while more IT products than ever before claim to use end-to-end encryption to keep your…
…
continue reading
1
The work from home guide to cybersecurity
51:52
51:52
Play later
Play later
Lists
Like
Liked
51:52
In this episode, Tresorit’s Stefan Killer-Haug joins security consultant and private investigator Shannon Miller to discuss the importance of cybersecurity for remote workers and how to your data safe while working from home. The popularity of flexible and hybrid working has exploded in recent years — and if you’re one of the many who has swapped t…
…
continue reading
1
Webinar - Harnessing the Power of Digital Trust
43:23
43:23
Play later
Play later
Lists
Like
Liked
43:23
In this podcast episode, Stefan Killer-Haug, Tresorit's representative, and Diana Kaliff, product lead for Swiss Digital Initiative, discussed the importance of digital trust and certifications. They talked about the Swiss Digital Trust label launched in 2022, the importance of building trust online as well as in the physical world, having a user-c…
…
continue reading
1
Webinar - How eSign keeps your business workflows encrypted and secure
53:15
53:15
Play later
Play later
Lists
Like
Liked
53:15
Discover how eSignatures improve cybersecurity & streamline workflows in this exciting podcast with Tresorit's CEO.Find out more at www.tresorit.comBy István Lám
…
continue reading
1
State of the Union: A Look Back at 2022 and a Glimpse into 2023 (German)
24:40
24:40
Play later
Play later
Lists
Like
Liked
24:40
Erfahren Sie von Ferenc Margel und Peter Stössel die neuesten Verbesserungen und Funktionen der letzten Monate sowie einen Einblick in die Produkt-Roadmap 2023.Find out more at www.tresorit.comBy Ferenc Margl, Peter Stössel
…
continue reading
1
Webinar: State of the Union - Tresorit’s latest releases for 2023
39:55
39:55
Play later
Play later
Lists
Like
Liked
39:55
In our latest webinar, we reveal our roadmap for everything from electronic signatures to encrypted e-mail. Our CEO and co-founder István Lám is also on hand to provide the latest insider updates on what’s in store for 2023.Find out more at www.tresorit.comBy István Lám, Olivia Michaud
…
continue reading
How making IT tools private by design helps businesses flourish? In this episode you'll understand how to to boost efficiency and cybersecurity at your company.Find out more at www.tresorit.comBy Péter Budai, Tamás Molnár
…
continue reading
1
Webinar - Tresorit eSign, the simple e-signature solution
28:06
28:06
Play later
Play later
Lists
Like
Liked
28:06
Tresorit becomes the platform to store sensitive documents, share confidential files and sign all types of business-critical agreements. In this episode you will meet Tresorit eSign, the simple, secure e-signature solution to sign all your confidential documents.Find out more at www.tresorit.comBy Böbe Hartung-Marjai, Tamás Molnár
…
continue reading
In this webinar, we guide you through Tresorit’s latest updates, from easier admin to encrypted e-mail.Find out more at www.tresorit.comBy Tresorit
…
continue reading
1
Webinar - 3 best practices for legal firms to protect client privilege
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36
Legal firms face a raft of digital threats — but almost all can be mitigated with a few simple steps.Find out more at www.tresorit.comBy Tresorit
…
continue reading
1
Webinar - Secure your digital business communications
29:20
29:20
Play later
Play later
Lists
Like
Liked
29:20
In this webinar, you'll learn: What are the challenges of remote and hybrid ways of working How to safeguard your digital business interactions by means of end-to-end encryption Why Tresorit is a great service for secure file sharing and email Why 7,000 companies have opted for Threema secure messaging Reduce the risks of sharing information with p…
…
continue reading
1
Webinar - Email Encryption in the new normal
31:44
31:44
Play later
Play later
Lists
Like
Liked
31:44
You’ll learn: Why encrypting emails should be top of your list to protect business data How to secure your hybrid workspace with email encryption How to easily integrate secure emailing to your existing workflows Reduce the risks of sharing information with peers, clients and other external parties. Find out more at www.tresorit.com…
…
continue reading
1
Matt Mitchell: Making digital hygiene skills available for everyone
48:06
48:06
Play later
Play later
Lists
Like
Liked
48:06
The current cyberspace landscape is a reflection of the world's social, political, and economic phenomena, mirroring the social inequality, discrimination and privacy violations that occur in society (and, in many cases, amplifying them). In our next podcast episode, we’ll dive deeper into these issues with celebrated human rights defender, hacker,…
…
continue reading
1
Ex-NSA engineer Alex White: Mobile security for high-risk individuals
1:04:29
1:04:29
Play later
Play later
Lists
Like
Liked
1:04:29
The myriad routines connected to them have made smartphones essential tools in our work and private lives. These days, mobile devices account for over half of global web traffic. Unsurprisingly, cybercriminals have also set their sights on this goldmine of data. Consumers and organizations alike have seen a surge in attacks on mobile devices due to…
…
continue reading
1
Ex-CIA officer Gus Hunt - Shifting towards data-centric security
52:10
52:10
Play later
Play later
Lists
Like
Liked
52:10
Rapid innovation should be counterbalanced by sensible security measures to protect our lives in the virtual space and, so far, encryption has proved to incredibly useful in doing just that. Encryption is after all the through-line of our daily digital routines, and is present (or should be present) in every message, transaction and video call you …
…
continue reading
1
Cologne Bonn Airport: Behind the scenes of airport operations – an interview with Dr. Demian Pitz
49:26
49:26
Play later
Play later
Lists
Like
Liked
49:26
Some associate airports with the excitement of travel, others think of them as transit points for business travel. However you view them, airports need to operate like clockwork and everyone – from employees to passengers – must follow a carefully controlled script. That said, we rarely take the time to reflect on the complex processes that guide t…
…
continue reading
1
DeleteMe: Disappearing from data brokers’ radar – an interview with Rob Shavell
33:41
33:41
Play later
Play later
Lists
Like
Liked
33:41
In our highly interconnected world, data is the fuel that keeps the digital economy up and running. Companies and platforms of all shapes and sizes are collecting, sharing and selling the personal information of their users without explicit consent to do so. We believe it’s time to regain ownership of your data by removing your private information …
…
continue reading
1
Troy Hunt: Password Security Is the Name of the Game
59:11
59:11
Play later
Play later
Lists
Like
Liked
59:11
The security of the New World we are building online is heavily dependent on password security but, despite this, password reuse and negligence continue to be a problem for the world’s Web users. This lax approach has created the ideal environment for hackers to thrive, as leaked credentials become replicated across the clean and dark web. To help …
…
continue reading
1
White Shark: Security As A Service In An Ocean Filled With Threats – an Interview with Laszlo Borsy
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05
2020: the year of the cyberattack – and the year that security services levelled up to combat this growing threat. Today on under CTRL, we’re joined by Laszlo Borsy - cybersecurity advocate and VP of Business Development at White Shark, a managed security services company based out of our hometown Budapest. White Shark represents a new breed of sec…
…
continue reading
1
Bark: A Child's Guardian In Cyberspace - a Talk with Titania Jordan
45:54
45:54
Play later
Play later
Lists
Like
Liked
45:54
Going online can expose children to new risks from cyberbullying, online predators, self-harm to uncensored content and targeted ads. The traditional protections we place around children are no longer effective in cyberspace, but can an app really help to prevent harmful situations both online and offline? Today, under CTRL is joined by Bark's Chie…
…
continue reading
1
Brave: Redesigned Browsing and Advertising Experience – an Interview with Luke Mulks
48:55
48:55
Play later
Play later
Lists
Like
Liked
48:55
Luke describes Brave as a “privacy browser with the first kind of integrated global private ad and reward platform”. By blocking trackers that allow platforms to create detailed audience profiles, Brave provides users with a “real clean start” and a browser experience that’s 3 times faster than Google. Having started his career in advertising, Luke…
…
continue reading
1
DuckDuckGo: can a search engine protect searchers' privacy? Interview with Kamyl Bazbaz
38:00
38:00
Play later
Play later
Lists
Like
Liked
38:00
Our search engine knows often more about us than our best friends – thanks to the data trails we leave as we are seeking answers to common and sensitive questions across the web. Is there a real choice, a private alternative for online search and navigation, without dismantling the boundaries of our privacy? The answer is clearly and reassuringly: …
…
continue reading
1
Phil Zimmermann: Is the EU declaring war on encryption?
1:07:12
1:07:12
Play later
Play later
Lists
Like
Liked
1:07:12
Phil Zimmermann creator of Pretty Good Privacy and Co-Founder of SilentCircle and István Lám, CEO of Tresorit discuss the recent press report from EU - "Draft Council Resolution on Encryption". Why are the five Eyes putting forward a proposal to expand “targeted lawful access” and what potential impact will this have on privacy? Is there a potentia…
…
continue reading
1
Digital identification revolutionized by AI - talk with Husayn Kassai
42:01
42:01
Play later
Play later
Lists
Like
Liked
42:01
How can "machine learning" tell if a goverment ID is genuine or fake? How does Revolut and other neobanks benefit from such services? How does Onfido support airport check-ins in parallel with connecting COVID19 test results to your digital identity? CEO and Co-Founder of Onfido, Husayn Kassai will shed light on these topics. You can find todays gu…
…
continue reading
1
The journey of clinical trials - an interview with Matt Barthel
50:26
50:26
Play later
Play later
Lists
Like
Liked
50:26
How do Pharma companies handle ultra sensitive data whilst some of the largest companies are racing to develop COVID-19 vaccination? CTO and Data Protection Officer of Adamas Consulting Group, Matt Barthel sheds some light on this complex matter. We discuss clinical trials, data security and compliance within this highly regulated industry and touc…
…
continue reading
1
ProtonMail: Tech monopolies and freedom of speech – discussion with Edward Shone
50:17
50:17
Play later
Play later
Lists
Like
Liked
50:17
In a world monopolised by tech giants, where data is being constantly abused and manipulated by corporations and governments alike - how does privacy and freedom of speech survive? We chat about everything from surveillance capitalism to regulations with Edward Shone, the PR Manager of ProtonMail. You can find todays guest on https://www.linkedin.c…
…
continue reading
1
Physical and digital security for high-end clients – a conversation with Maria Olshanskaya
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30
Come along with us as we venture into the exclusive world of VIPs and discuss what physical and cybersecurity means to high-end clients. Walking us through the challenges of providing the highest levels of safety and privacy to a global customer base is Maria Olshanskaya, Co-Founder and Active Partner of Tel Aviv’s Aera Global Corp. You can find to…
…
continue reading
1
Schrems II: The invalidated Privacy Shield and its aftermath – a walkthrough with Jitty van Doodewaerd
22:03
22:03
Play later
Play later
Lists
Like
Liked
22:03
With the Schrems 2 ruling finalized in July, how will enterprise data protection be affected? What is the future of the EU-US Privacy Shield? We chat with Jitty van Doodewaerd from DMCC who was formerly part of the Big Data Expert Group of the Dutch Ministry of Economic Affairs. You can find todays guest on https://www.linkedin.com/in/jitty-van-doo…
…
continue reading
1
Secure digital collaboration on the water – HR insights with Codi Robbins
34:27
34:27
Play later
Play later
Lists
Like
Liked
34:27
Join us as we sail off into the sea to discuss how human-centric roles such as hospitality, and different generations all successfully coexist with technology and data security. Helping us navigate the waters is Hornblower Cruises and Events HR manager Codi Robbins from California. You can find todays guest on https://www.linkedin.com/in/codirobbin…
…
continue reading