Tresorit

Preparing for federal supply chain security standardization
In 2021, the Biden Administration published the Executive Order on Improving the Nation’s Cybersecurity (EO 14028), setting off an agency-wide security initiative with the …

Infosec products of the month: November 2022
Here’s a look at the most interesting products from the past month, featuring releases from: Abnormal Security, Acronis, Bearer, Bitdefender, Clumio, Cohesity, Flashpoint, …

New infosec products of the week: November 4, 2022
Here’s a look at the most interesting products from the past week, featuring releases from Bitdefender, Forescout, Mitek, NAVEX, OneSpan, Persona, Qualys, Tanium, and …

Tresorit adds eSignature function to secure sensitive information and documents
Tresorit has expanded its portfolio of integrated solutions tailored to the US market, supplementing its secure workspace and email encryption plugins with eSignature …

Only 30% of enterprises use cloud services with E2E encryption for external file sharing
A recent study of enterprise IT security decision makers conducted by Tresorit shows that majority of enterprises use additional encryption methods to boost the security of …
Swiss Post acquires Tresorit to further secure its digital services
Tresorit announces that Swiss Post Communications Services acquired a majority stake in the company on July 6. With this acquisition, the two companies will collaborate to …

New infosec products of the week: August 18, 2017
New Firebox M Series appliances help SMBs keep up with encrypted traffic WatchGuard Technologies announced hardware upgrades to its Firebox M Series to handle the …

Tresorit for Business
In the cloud computing era, companies need to be proactive on secure collaboration and file sharing. Tresorit for Business is a solution that, among other things, helps …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems