News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Audit-proof data protection for cloud infrastructures 
Audit-proof data protection for cloud infrastructures

The patented microshard process defies current data protection concerns in relation to cloud infrastructures: data is broken down into single-digit bytes without loss of performance. These microshards are then stored in cloud environments or on on-premises servers. Generally applicable regulations such as the General Data Protection Regulation (GDPR) or industry-specific standards such as the KRITIS regulation of the BSI or the telematics infrastructure often impair corporate flexibility and agility. They go hand in hand with new investments. Corporate decision-makers are increasingly unsettled. In view of the unclear legal situation, many therefore hesitate to outsource parts of their infrastructure to a cloud infrastructure. Data protection for cloud infrastructures In addition, after…

Read more

Authentic and audit-proof emails
Every third suspicious email is also a threat

Authentic and audit-proof e-mail communication via blockchain: totemo starts totemomail Verified in January 2021. E-mail is still the universal means of communication, especially in business life, although its advantages are offset by disadvantages such as phishing risks or the lack of audit security. With totemomail Verified, totemo, provider of secure electronic communication in the business environment, presents a solution that solves these challenges with the help of distributed ledger technology (DLT). The technology was developed in cooperation with Vereign, in the context of which Dario Perfettibile, CEO of totemo, was elected to the board of directors of the crypto start-up. Authenticity: Is the sender who he ...

Read more