Top rating for idgard®: Data protection winner in Techconsult user survey thanks to Confidential Computing
Top rating for idgard®: We are rated champion in the Techconsult “Professional User Ratings Digital Solutions 2021”.
Continue reading »Top rating for idgard®: We are rated champion in the Techconsult “Professional User Ratings Digital Solutions 2021”.
Continue reading »Does your company categorize data before uploading it to the cloud for archiving, processing, or transfer? This and similar questions are addressed in the IDG […]
Continue reading »At the end of June, the hacker collective “Zerforschung” uncovered once again serious security gaps at German Coronavirus test centers. According to the specialists, they […]
Continue reading »More than half of German companies carry out data classification before cloud migration. This is the conclusion of the “Cloud Security 2021” study recently published […]
Continue reading »Sometimes less is more: From now on we will present every idgard® update and all innovations about our highly secure cloud service on this page. […]
Continue reading »Data protection breaches such as data theft and data loss, poor data availability and insufficient resilience are some of the biggest security risks in the […]
Continue reading »The electronic health card has arrived—and it’s causing quite a stir already. Patients are not entitled to an insurance certificate in paper form, even if […]
Continue reading »Brexit is here: As of January 1, 2021, the United Kingdom is no longer a member of the European Union. The exit agreement between London […]
Continue reading »The e-evidence regulation is intended to give authorities within Europe express access to evidence (e-evidence) on the Internet in the future. Service providers such as […]
Continue reading »In November 2020, the US high-tech provider Cisco published the results of its study “Future of Secure Remote Work”. In the framework of this study, […]
Continue reading »The corona pandemic is striking back with full force after the summer: Many companies have already decided to go back to working from home. This […]
Continue reading »Secure data transfer is still one of the biggest challenges for companies. This includes sharing documents with customers, partners and colleagues. After all, it is […]
Continue reading »Sending attachments securely by email? You have to be careful! Confidential documents should not be sent by as email attachment—especially not unencrypted and if the […]
Continue reading »Have you accidentally opened a phishing e-mail? We have already shown you how to protect yourself against phishing attacks. But what if you do fall […]
Continue reading »If you share sensitive data or information by e-mail, it is very important that you encrypt it. The readable text and attachments are converted into […]
Continue reading »(Co-author: Moritz Wappner) German companies, TÜV SÜD reports quoting the latest phishing report by Cofense, are particularly frequently targeted by criminal phishing attacks. Since the […]
Continue reading »Confidential computing describes the approach of not only encrypting data during storage and transmission, but also during processing. To this end, several major providers—including Google, […]
Continue reading »