Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 17 May, 2022
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Why the new NSA revelations remain particularly important for companies

by The Gurus
August 21, 2015
in Editor's News
Share on FacebookShare on Twitter

The evaluation of Edward Snowden’s documents still bring new information about the scale of the NSA scandal to light. According to a report from the New York Times from the 15th August, the US telephone provider AT&T helped the NSA spy on internet traffic in a form which was described by the NSA itself as being “a partnership, not a contractual relationship”. Most recently 60 million emails were forwarded illegally to the NSA every day even though they were not explicitly requested by the NSA.
Snowden’s documents only go to 2013. Since then it has to be assumed that the spying capabilities of the NSA and other agencies have been significantly extended. Thanks to the technical advances in “Big Data” it is not only possible to collect unimaginable amounts of data but to analyze and evaluate it. It is common knowledge that the data is not only used for counterterrorism but also for industrial spying.
The public indignation however seems to decrease with every new revelation. But within the corporate world it’s a different story. The Berlin based email encryption specialist Zertificon experiences a clear rise in interest with each new NSA revelation.
“Every detail of the NSA scandal is a wake up call for the project managers. Many organizations want to have encryption solutions in place but never got round to it. It’s common knowledge that emails are about as secure as postcards, and put simply, nobody wants to be the person hung out to dry when the competition gets hold of secret commercially sensitive emails.” according to Nikolina Baborac from Zertificon’s sales team.

Email security projects were often put on hold for practical reasons such as the complex installation, administration and operation. But these reasons are no longer valid today. Company wide email encryption with the mature and field-proven Z1 SecureMail Gateway from Zertificon is just as efficient and simple as a standard email solution. The gateway can be installed and integrated into standard IT infrastructures in just a couple of hours. Employees do not require any special software or training and it is possible to exchange encrypted emails with any recipient – even individuals who do not use any encryption software. Furthermore, email signatures can be centrally applied and evaluated. The counterfeiting protection offered by email signatures provides a high level of integrity and security. Alongside the protection against cyber and industrial spying, the investment in a gateway delivers compliance conformity and is an effective protection against phishing attacks.
Further details can be found at: www.zertificon.com.

FacebookTweetLinkedIn
Tags: Cyber SecurityEdward Snowdeninformation securityinfosecit securityNSASnowdenspying
ShareTweetShare
Previous Post

Government agencies: Under attack, but ignorant to cyber security

Next Post

Amazon to trash Flash, as browsers walk away

Recent News

Armis: Top Performer in Asset Visibility and Real-Time Detection in MITRE Engenuity ATT&CK® Evaluations for Industrial Control Systems (ICS)

Armis Launches new ‘Critical Infrastructure Protection Program’

May 17, 2022
jigsaw

Thanos and Jigsaw ransomware linked to 55 year old doctor

May 17, 2022
Google logo

Italian police thwart Eurovision cyberattack

May 17, 2022
nuclear power stack

UK announces nuclear cybersecurity strategy

May 16, 2022

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information