Content Hub

cybersecurity

Search
Compliance team in office meeting
Article
4 Min

Protecting Customer Data: Is Your DSAR Process Compliant?

Are your processes compliant when it comes to DSAR requests? Learn how to authenticate requests, securely transmit data, and...

CEO Interview Outbound Email Security Paul Holland
Interview
10 Min

Outbound Email Security: Is It Becoming The Norm?

I turned the mic on CEO Paul this week to ask where outbound email security is going, the risks, and the opportunities it can...

woman encrypting an email in outlook
Article
3 Min

How To Encrypt An Email In Outlook

Encrypting your emails can help to protect your privacy and security by reducing the chance of...

Male and female colleagues assessing problem on laptop.jpg
Article
4 Min

Quantum Computing & Encryption: Risks, Opportunities, and Implications

In this article, I explore the implications of quantum computing on encryption and cover some best...

Female professional smiling and looking at laptop on modern office desk
Email DLP
4 Min

How to Send a Truly Private Email (Can It Be Done?)

Yes, it is possible to send a truly private email (with some caveats!). You need to use encryption...

Professional woman working in home office on desktop computer
101 Guide
7 Min

What Is a Secure Email Gateway (SEG)?

Learn how secure email gateways (SEGs) protect inbound and outbound emails, the...

Female professional using desktop computer to authenticate emails
101 Guide
8 Min

What Is Email Authentication?

Email authentication verifies the identity of an email sender or recipient. It...

UK Consumer Using Computer In Home Office
Research
10 Min

Are UK Consumers Not Taking Email Security Seriously? (2023 Research)

This 2023 report analyses UK consumer email security awareness and practices....