Artwork

Content provided by Tresorit. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tresorit or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

How companies can go beyond end-to-end encryption

31:17
 
Share
 

Manage episode 364164529 series 2769887
Content provided by Tresorit. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tresorit or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

End-to-end encryption (E2EE) is increasingly mainstream, appearing in everything from mass-market instant messaging apps to high-end password managers.

But for E2EE to truly reach its potential, it needs to act as just one part of a secure IT infrastructure. And while more IT products than ever before claim to use end-to-end encryption to keep your data safe, many of these solutions also cut vital corners in their cryptography protocols — putting your information at risk.

In this special webinar podcast direct from ITsa365, Tresorit co-founder and CISO, Szilveszter Szebeni, talks to Encryption Europe’s James Briscoe about down the different types of encryption, how end-to-end encryption works, and what organizations need to be looking for in their secure IT solutions.

We’ll also be discussing why email as we know it today will never be secure, and the myth that easy-to-use products are more vulnerable to cyberattacks.

  continue reading

53 episodes

Artwork
iconShare
 
Manage episode 364164529 series 2769887
Content provided by Tresorit. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tresorit or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

End-to-end encryption (E2EE) is increasingly mainstream, appearing in everything from mass-market instant messaging apps to high-end password managers.

But for E2EE to truly reach its potential, it needs to act as just one part of a secure IT infrastructure. And while more IT products than ever before claim to use end-to-end encryption to keep your data safe, many of these solutions also cut vital corners in their cryptography protocols — putting your information at risk.

In this special webinar podcast direct from ITsa365, Tresorit co-founder and CISO, Szilveszter Szebeni, talks to Encryption Europe’s James Briscoe about down the different types of encryption, how end-to-end encryption works, and what organizations need to be looking for in their secure IT solutions.

We’ll also be discussing why email as we know it today will never be secure, and the myth that easy-to-use products are more vulnerable to cyberattacks.

  continue reading

53 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide