under CTRL

How companies can go beyond end-to-end encryption

Episode Summary

End-to-end encryption (E2EE) is the best way to keep your personal data safe from prying eyes. But not every IT solution that uses E2EE truly delivers on its promise of security and transparency. Join Tresorit co-founder and CISO, Szilveszter Szebeni, as he delves into what businesses should be looking for in their E2EE solutions, and how the right tools can be used to minimize human error.

Episode Notes

End-to-end encryption (E2EE) is increasingly mainstream, appearing in everything from mass-market instant messaging apps to high-end password managers. 

But for E2EE to truly reach its potential, it needs to act as just one part of a secure IT infrastructure. And while more IT products than ever before claim to use end-to-end encryption to keep your data safe, many of these solutions also cut vital corners in their cryptography protocols — putting your information at risk. 

In this special webinar podcast direct from ITsa365, Tresorit co-founder and CISO, Szilveszter Szebeni, talks to Encryption Europe’s James Briscoe about down the different types of encryption, how end-to-end encryption works, and what organizations need to be looking for in their secure IT solutions. 

We’ll also be discussing why email as we know it today will never be secure, and the myth that easy-to-use products are more vulnerable to cyberattacks.