News and insights

Keep your pulse on the newest trends and updates about planck Security and the Zero Trust Communication security landscape.

Insight

NIS2 Compliance: Checklist for Office 365 Users

Understanding NIS2 Compliance The NIS2 Directive (Directive (EU) 2022/2555) is a pivotal piece of legisl...

Insight

Fixing Proofpoint Email Protection: 3 Steps to Avoid Spoofing and Phishing Campaigns From Your...

How Malicious Actors Broke Proofpoint's Cybersecurity What happened with Proofpoint Email Protection? In...

Insight

How to Avoid a Business Email AI Scam

Do you think you’d know the difference between your actual boss and an AI fake version on a video call? ...

Insight

Top 5 Security and Privacy Conferences to Attend in 2024

In the rapidly evolving landscape of cybersecurity, marked by constant advancements and evolving threats...

Insight

Successful Email Security Strategies for IP Protection

In this fast-paced digital landscape, where information flows seamlessly, intellectual property (IP), in...

Insight

Zero Trust and Cloud Services: How a Layered Approach Strikes a Balance Between Convenience an...

The Place of Cloud Services in the Modern Business Environment: An Overview Since its first steps in the...

Insight

You Can’t Fight AI with AI: The Crucial Role of Sender Verification in Content Inspection

In today's digital landscape, phishing attacks remain a persistent and ever-evolving cybersecurity conce...

Insight

How End-to-End Encryption Can Save You Millions in GDPR Fines

The General Data Protection Regulation (GDPR) has significantly impacted business operations and interac...

Insight

Encryption is truly end-to-end if you avoid centralized architectures

Most providers, including email providers, claim to offer end-to-end encryption to their users. Some eve...

Insight

Microsoft Storm558 attack: Zero Trust could have mitigated risks

Zero Trust and end-to-end encryption in M365: how they mitigate risks In early July, it was revealed tha...