
What are email key pairs and certificates, and how are they used?
Whether for email signing or encryption, they come in pairs: private and public. How can your business/organization manage them without issues? Read more

Send electronic prescriptions to patients via email in compliance with GDPR
TLS is unfit for patient communication outside healthcare networks—due to data protection. Read why content encryption is appropriate. Read more

When can I use domain certificates for email encryption?
Domain certificates are certificates issued to legal entities. Are these certificates useful and what should be considered? Read more

The latest court ruling on the EU Trade Secrets Protection Act in Germany: Is TLS encryption for emails sufficient as a protective measure?
How reasonable are your steps to guard business and avoid managing director liability? Understand transport vs. content encryption. Read more

End-to-end email encryption – best practices for enterprises
Businesses need secure email. It needs to be confidential, compliant. So end-to-end encryption is the answer? Here is what E2EE means for enterprises. Read more

Patented email encryption solution for exchange with contacts without certificates
During your search for an email encryption solution, you may come across information giving the impression that Zertificon is infringing an existing [...] Read more

What does the use of cloud services mean for email security?
How can organizations achieve secure email and GDPR compliance in the cloud? Find out about encryption and signing with cloud services. Read more

Unencrypted emails endanger companies – especially during the pandemic
Restrictions in public life in the wake of the pandemic have led to a surge in digitization in many areas. At the same time, criminals are using the [...] Read more

4 Benefits of Shorter X.509 Validity Periods for Web and Email Certificates
Email certificates for S/MIME encrypted communication use the same technical standard as browser certificates. Both are X.509 certificates with different [...] Read more

Intercepted emails in times of big data – the underestimated threat
Nearly daily news of cyber attacks on companies reaches us. Hackers obtain access to internal networks. What about sensitive data that is transferred via [...] Read more