Significance of secure data transfer for German energy suppliers increases

German energy suppliers have been declared as operators of critical infrastructures since the summer of 2015. According to the IT-Security Law they must send data via a secure connection.

Read more

Seven things you should consider when choosing a new software tool

Companies often focus too much on single functions when investing in new technology. Our graphic shows you which points to check before going for it...

Read more

Provide the right business tools – or else…

Companies have to pay more attention to the right software for their employees - not only from an employer’s image point of view but also for good economics and legality.

Read more

Cryptshare for Outlook on Product Hunt

Great news! We are suggested on the influential platform Product Hunt! Please help us by upvoting and sharing it.

Read more

Security issues leave cloud infrastructure vulnerable

A newly discovered weak spot in the technology used to deliver cloud services enables criminals and governments to access information stored and processed in the cloud.

Read more

Lessons to be learnt from Panama Papers

In times of digital communication and the internet many things have changed in our private and corporate life. Among them is the possibility to gather information and organise and share them internationally in a very short amount of time.

Read more

Digital transformation in public authorities

Writing about cyber espionage these days seems almost needless. Not a single day passes without another report of stolen, lost, or unsecured data somewhere around the world. We live in a digital society and much of our private, public, and corporate communication and data storage happens online.

Read more

A vulnerability named "Drown" affects numerous web servers. Please check your Cryptshare Server!

The DROWN (Decrypting RSA using Obsolete and Weakened eNcryption) vulnerability (CVE-2016-0800) not only affects systems using SSLv2. Even servers that are equipped with a certificate, which uses the same private key that has been used to create certificates for other web servers accessible via SSLv2 are at risk.

Read more

How to protect yourself from Ransomware Attacks

A recent worldwide wave of encryption-trojans like “Locky” and “TeslaCrypt” have been keeping companies, private users and the entire security industry on their toes. Experts like the German Federal Office for Information Security (the “BSI”) are now providing recommendations on how to protect private and business data. We have collected some of these recommendations and added our own.

Read more

Fix for security vulnerability CVE-2015-7547 in glibc is now available for Cryptshare.

A fix for the security vulnerability CVE-2015-7547 in the glibc library is now available for Cryptshare Appliances and will be deployed in the night from Feb. 19th to 20th.

Read more

Topics

About this blog

With our software Cryptshare we enable our customers to share e-mails and files of any size securely in an ad-hoc way with a detailed audit trail and a strong ROI.

On our blog we write about email encryption, cybercrime, security gaps, malware, data protection and more. In short, anything about data security.

Follow us