Hi, I'm Matthias, co-founder of Tuta, a secure email service. We are innovation leaders in encrypted communication and collaboration. The world is changing at a faster pace than ever, particularly in ...
The growth of mobile computing over the past few years, combined with numerous breaches that have been disclosed through the media, has created a desire to keep both our personal and corporate ...
You probably use encryption, in one form or another, every day. You might not know that you are, but you are. And my guess is that you don’t give it a second thought. Do you have a subscription based ...
With RCS rolling out on the iPhone yesterday, Google is looking ahead on new features including cross-platform end-to-end encryption (E2EE) between Android and iPhone. The governing GSMA body says the ...
The Jericho Forum is an organization pushing for innovation in e-commerce security. In this essay, Joerg Horn, head of gateway solutions at Utimaco, a Jericho Forum member, discusses combining ...
Need a way to prevent the enemy from intercepting and deciphering your message? American mathematician Claude Shannon, AKA the “father of information theory” had a way to do it. He came up with a ...
Police and tech security experts have weighed in with a possible solution to the immovable-object-meets-irresistible-force conundrum posed by the use of strong encryption. Across Europe, police argue ...
Over the past month, Americans across the country have adapted to a new reality of life, which includes social distancing to curb the spread of COVID-19. For those fortunate enough to be able to do so ...
The CEO of popular video conferencing software Zoom said the company has no plans to offer end-to-end encryption to users of its free version so it can continue working with law enforcement. During ...
Your IT administrator will normally set it up for you on your device. You just need your company email ID or the URL of the work folders to set it up. You will also require login credentials which ...