<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Cryptshare Blog</title>
    <link>https://blog.cryptshare.com/en</link>
    <description>Read news in the fields of economic crime, economic espionage, piracy and email Privacy</description>
    <language>en</language>
    <pubDate>Tue, 14 Mar 2023 14:16:23 GMT</pubDate>
    <dc:date>2023-03-14T14:16:23Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Court ruling on email: What enterprises in Germany must know now</title>
      <link>https://blog.cryptshare.com/en/court-ruling-on-email-what-enterprises-in-germany-must-know</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/court-ruling-on-email-what-enterprises-in-germany-must-know" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Was-Unternehmen-bei-E-Mails-jetzt-beachten-m%C3%BCssen_Blog-Grafik_EN_2.jpg" alt="Court ruling on email: What enterprises in Germany must know now" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;Communication affects all departments in everyday business: product development, human resources, sales etc. But how much should be sent by regular email or as an email attachment? Depending on their content, various regulations apply to data transfers and those must be observed. In addition, there are requirements for signing documents which determine their legal validity. In Germany, there is a lot that needs to be considered in this regard. We asked the CFO of Cryptshare, Oliver Kenk, to shed more light on this. &lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/court-ruling-on-email-what-enterprises-in-germany-must-know" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Was-Unternehmen-bei-E-Mails-jetzt-beachten-m%C3%BCssen_Blog-Grafik_EN_2.jpg" alt="Court ruling on email: What enterprises in Germany must know now" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;Communication affects all departments in everyday business: product development, human resources, sales etc. But how much should be sent by regular email or as an email attachment? Depending on their content, various regulations apply to data transfers and those must be observed. In addition, there are requirements for signing documents which determine their legal validity. In Germany, there is a lot that needs to be considered in this regard. We asked the CFO of Cryptshare, Oliver Kenk, to shed more light on this. &lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fcourt-ruling-on-email-what-enterprises-in-germany-must-know&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Data exchange</category>
      <category>Data Security</category>
      <category>Legal</category>
      <pubDate>Wed, 27 Jul 2022 12:00:00 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/court-ruling-on-email-what-enterprises-in-germany-must-know</guid>
      <dc:date>2022-07-27T12:00:00Z</dc:date>
    </item>
    <item>
      <title>Into the digital age with fax?</title>
      <link>https://blog.cryptshare.com/en/into-the-digital-age-with-fax</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/into-the-digital-age-with-fax" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/undefined-Nov-22-2021-07-07-26-57-AM.jpeg" alt="Into the digital age with fax?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-size: 13px;"&gt;&lt;strong&gt;&lt;span style="font-size: 16px;"&gt;Digital driving licences, digital authorizations, e-prescriptions... the list of demands for Germany's digital transformation is long. Unfortunately, however, all too often aspiration collides with reality because Germany is lagging far behind in terms of digitalisation. The best example is fax as a means of communication. Fax has been out of date for a long time and does not meet today's requirements, not even those for data protection (cue GDPR). However, it is still in use so widely that in the 2021 federal election campaign a political party rubbed salt into the wound by advertising the phasing out of faxes by 2038. &lt;/span&gt;&lt;br&gt;&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/into-the-digital-age-with-fax" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/undefined-Nov-22-2021-07-07-26-57-AM.jpeg" alt="Into the digital age with fax?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-size: 13px;"&gt;&lt;strong&gt;&lt;span style="font-size: 16px;"&gt;Digital driving licences, digital authorizations, e-prescriptions... the list of demands for Germany's digital transformation is long. Unfortunately, however, all too often aspiration collides with reality because Germany is lagging far behind in terms of digitalisation. The best example is fax as a means of communication. Fax has been out of date for a long time and does not meet today's requirements, not even those for data protection (cue GDPR). However, it is still in use so widely that in the 2021 federal election campaign a political party rubbed salt into the wound by advertising the phasing out of faxes by 2038. &lt;/span&gt;&lt;br&gt;&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Finto-the-digital-age-with-fax&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Digitisation &amp; Digitalisation</category>
      <category>Data exchange</category>
      <category>Data Security</category>
      <pubDate>Tue, 23 Nov 2021 07:00:00 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/into-the-digital-age-with-fax</guid>
      <dc:date>2021-11-23T07:00:00Z</dc:date>
    </item>
    <item>
      <title>GAIA-X, data protection &amp; data control: What is viable for enterprises?</title>
      <link>https://blog.cryptshare.com/en/gaia-x-data-protection-data-control-what-is-viable-for-enterprises</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/gaia-x-data-protection-data-control-what-is-viable-for-enterprises" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/undefined-Mar-03-2021-08-52-19-71-AM.gif" alt="GAIA-X, data protection &amp;amp; data control: What is viable for enterprises?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;&lt;br&gt;For European enterprises that had high hopes GAIA-X would bring real added value in terms of data protection and digital sovereignty, the project’s current course would likely appear to be disappointing. The last few months have shown that when it comes to ensuring GAIA-X will deliver on its claims in these key areas, there is unfortunately little reason to put much faith in the main drivers of the project. It is uncertain if decision-makers in politics and business will change their minds. In any case, there is plenty of reason for companies not to rely exclusively on GAIA-X as their digital saviour, but to become active themselves. There is plenty they can and should do within their own circles of influence. &lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/gaia-x-data-protection-data-control-what-is-viable-for-enterprises" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/undefined-Mar-03-2021-08-52-19-71-AM.gif" alt="GAIA-X, data protection &amp;amp; data control: What is viable for enterprises?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;&lt;br&gt;For European enterprises that had high hopes GAIA-X would bring real added value in terms of data protection and digital sovereignty, the project’s current course would likely appear to be disappointing. The last few months have shown that when it comes to ensuring GAIA-X will deliver on its claims in these key areas, there is unfortunately little reason to put much faith in the main drivers of the project. It is uncertain if decision-makers in politics and business will change their minds. In any case, there is plenty of reason for companies not to rely exclusively on GAIA-X as their digital saviour, but to become active themselves. There is plenty they can and should do within their own circles of influence. &lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fgaia-x-data-protection-data-control-what-is-viable-for-enterprises&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Digitisation &amp; Digitalisation</category>
      <category>Cloud-Computing</category>
      <category>Data Security</category>
      <pubDate>Thu, 04 Mar 2021 07:00:00 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/gaia-x-data-protection-data-control-what-is-viable-for-enterprises</guid>
      <dc:date>2021-03-04T07:00:00Z</dc:date>
    </item>
    <item>
      <title>Serious setbacks after an ambitious start – which goals remain for GAIA-X?</title>
      <link>https://blog.cryptshare.com/en/serious-setbacks-after-ambitious-start-which-goals-remain-for-gaia-x</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/serious-setbacks-after-ambitious-start-which-goals-remain-for-gaia-x" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/undefined-Feb-24-2021-02-45-14-35-PM.gif" alt="Serious setbacks after an ambitious start – which goals remain for GAIA-X?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;&lt;br&gt;First the German federal government signalled support for the participation of US hyperscalers in GAIA-X. Subsequently, the companies on its Board of Directors welcomed Palantir, arguably the most controversial player in big data, as a member. All this despite major concerns from data protectionists. GAIA-X’s more recent course raises the fundamental question of whether digital sovereignty and data protection in accordance with European standards can still be achieved for companies. What remains of GAIA-X’s original objectives and what of its inherent potential can the project still turn into reality?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/serious-setbacks-after-ambitious-start-which-goals-remain-for-gaia-x" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/undefined-Feb-24-2021-02-45-14-35-PM.gif" alt="Serious setbacks after an ambitious start – which goals remain for GAIA-X?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;&lt;br&gt;First the German federal government signalled support for the participation of US hyperscalers in GAIA-X. Subsequently, the companies on its Board of Directors welcomed Palantir, arguably the most controversial player in big data, as a member. All this despite major concerns from data protectionists. GAIA-X’s more recent course raises the fundamental question of whether digital sovereignty and data protection in accordance with European standards can still be achieved for companies. What remains of GAIA-X’s original objectives and what of its inherent potential can the project still turn into reality?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fserious-setbacks-after-ambitious-start-which-goals-remain-for-gaia-x&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Digitisation &amp; Digitalisation</category>
      <category>Cloud-Computing</category>
      <category>Data Security</category>
      <pubDate>Thu, 25 Feb 2021 07:00:00 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/serious-setbacks-after-ambitious-start-which-goals-remain-for-gaia-x</guid>
      <dc:date>2021-02-25T07:00:00Z</dc:date>
    </item>
    <item>
      <title>GAIA-X Board of Directors gives green light to Palantir</title>
      <link>https://blog.cryptshare.com/en/gaia-x-board-of-directors-gives-green-light-to-palantir</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/gaia-x-board-of-directors-gives-green-light-to-palantir" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/undefined-4.gif" alt="GAIA-X Board of Directors gives green light to Palantir" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;An unpleasant surprise for data protectionists and supporters of GAIA-X: The all-European Board of Directors of GAIA-X cleared the way for Palantir to become a member. The reaction to this decision ranged from surprise to horror, as the company does not seem to fit in at all with what GAIA-X is supposed to stand for. After a statement by the German federal government, a key political player, had already caused some concern, this decision of the economic stakeholders now raises some serious questions: What criteria are used in the GAIA-X selection process? Do they match up to the proclaimed objectives of the project? And what might this say about GAIA-X itself?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/gaia-x-board-of-directors-gives-green-light-to-palantir" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/undefined-4.gif" alt="GAIA-X Board of Directors gives green light to Palantir" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;An unpleasant surprise for data protectionists and supporters of GAIA-X: The all-European Board of Directors of GAIA-X cleared the way for Palantir to become a member. The reaction to this decision ranged from surprise to horror, as the company does not seem to fit in at all with what GAIA-X is supposed to stand for. After a statement by the German federal government, a key political player, had already caused some concern, this decision of the economic stakeholders now raises some serious questions: What criteria are used in the GAIA-X selection process? Do they match up to the proclaimed objectives of the project? And what might this say about GAIA-X itself?&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fgaia-x-board-of-directors-gives-green-light-to-palantir&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Digitisation &amp; Digitalisation</category>
      <category>Cloud-Computing</category>
      <category>Data Security</category>
      <pubDate>Thu, 18 Feb 2021 07:00:00 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/gaia-x-board-of-directors-gives-green-light-to-palantir</guid>
      <dc:date>2021-02-18T07:00:00Z</dc:date>
    </item>
    <item>
      <title>360° protection for data at rest and in transit</title>
      <link>https://blog.cryptshare.com/en/360-protection-for-data-at-rest-and-in-transit</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/360-protection-for-data-at-rest-and-in-transit" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/digitronic%20EN-1.png" alt="360° protection for data at rest and in transit" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span&gt;As communication is now almost exclusively digital and confidential information is routinely sent from A to B, comprehensive protection of this data needs to be a top priority. Of course, this must be fast and business operations should not suffer as a result. But at the same time malign third parties must be prevented from intercepting or accessing sensitive data during storage or during transmission.&lt;br&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/360-protection-for-data-at-rest-and-in-transit" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/digitronic%20EN-1.png" alt="360° protection for data at rest and in transit" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span&gt;As communication is now almost exclusively digital and confidential information is routinely sent from A to B, comprehensive protection of this data needs to be a top priority. Of course, this must be fast and business operations should not suffer as a result. But at the same time malign third parties must be prevented from intercepting or accessing sensitive data during storage or during transmission.&lt;br&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2F360-protection-for-data-at-rest-and-in-transit&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Partnership</category>
      <category>Data Security</category>
      <pubDate>Wed, 17 Feb 2021 08:55:00 GMT</pubDate>
      <guid>https://blog.cryptshare.com/en/360-protection-for-data-at-rest-and-in-transit</guid>
      <dc:date>2021-02-17T08:55:00Z</dc:date>
      <dc:creator>Hanna Rietz</dc:creator>
    </item>
    <item>
      <title>German Federal Government disappoints in their statement on GAIA-X</title>
      <link>https://blog.cryptshare.com/en/german-federal-government-disappoints-in-their-statement-on-gaia-x</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/german-federal-government-disappoints-in-their-statement-on-gaia-x" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/undefined-3.gif" alt="German Federal Government disappoints in their statement on GAIA-X" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;&lt;br&gt;Data traffic from the EU to the US is substantial and ever-growing. This is mainly due to the general trend of shifting data into the cloud, with its major service providers based in the US. The legal basis for these data transfers has needed to be re-established repeatedly, as so far respective agreements have neither been able to constitute a lasting solution nor bring the legal certainty so urgently needed by EU companies. A European approach like the GAIA-X project could provide the sought-after remedy, presenting a valuable alternative to the US hyperscalers. It was launched with great and ambitious goals, with the German government as one of its main drivers. So, what role do they see for GAIA-X? &lt;br&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/german-federal-government-disappoints-in-their-statement-on-gaia-x" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/undefined-3.gif" alt="German Federal Government disappoints in their statement on GAIA-X" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;&lt;br&gt;Data traffic from the EU to the US is substantial and ever-growing. This is mainly due to the general trend of shifting data into the cloud, with its major service providers based in the US. The legal basis for these data transfers has needed to be re-established repeatedly, as so far respective agreements have neither been able to constitute a lasting solution nor bring the legal certainty so urgently needed by EU companies. A European approach like the GAIA-X project could provide the sought-after remedy, presenting a valuable alternative to the US hyperscalers. It was launched with great and ambitious goals, with the German government as one of its main drivers. So, what role do they see for GAIA-X? &lt;br&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fgerman-federal-government-disappoints-in-their-statement-on-gaia-x&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Digitisation &amp; Digitalisation</category>
      <category>Cloud-Computing</category>
      <category>Data Security</category>
      <pubDate>Thu, 11 Feb 2021 07:00:00 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/german-federal-government-disappoints-in-their-statement-on-gaia-x</guid>
      <dc:date>2021-02-11T07:00:00Z</dc:date>
    </item>
    <item>
      <title>Legal rift between the EU and USA: Data handling &amp; data transfer and the implications for enterprises</title>
      <link>https://blog.cryptshare.com/en/legal-rift-eu-usa-data-handling-data-transfer-implications-for-enterprises</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/legal-rift-eu-usa-data-handling-data-transfer-implications-for-enterprises" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/undefined-1.gif" alt="Legal rift between the EU and USA: Data handling &amp;amp; data transfer and the implications for enterprises" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-size: 16px;"&gt;&lt;strong&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span&gt;In 2021, enterprises will continue to encounter many challenges that they need to address: Strengthening data security, ensuring verifiable compliance with applicable data protection laws, and maintaining effective protection of intellectual property will continue to be persistent issues. For enterprises, all three of these aspects apply to their data exchanges with third parties and are particularly relevant for data flow to the USA – which creates a need for action. Data transfers from the EU to the United States urgently require a robust and long-term legal basis, especially since the trend to shift data to the cloud is ongoing and has been creating fresh precedents on a daily basis, amplifying the need for action. In the search for real data protection and digital sovereignty, the European GAIA-X project is therefore coming into focus as a potential remedy.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/legal-rift-eu-usa-data-handling-data-transfer-implications-for-enterprises" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/undefined-1.gif" alt="Legal rift between the EU and USA: Data handling &amp;amp; data transfer and the implications for enterprises" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-size: 16px;"&gt;&lt;strong&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span&gt;In 2021, enterprises will continue to encounter many challenges that they need to address: Strengthening data security, ensuring verifiable compliance with applicable data protection laws, and maintaining effective protection of intellectual property will continue to be persistent issues. For enterprises, all three of these aspects apply to their data exchanges with third parties and are particularly relevant for data flow to the USA – which creates a need for action. Data transfers from the EU to the United States urgently require a robust and long-term legal basis, especially since the trend to shift data to the cloud is ongoing and has been creating fresh precedents on a daily basis, amplifying the need for action. In the search for real data protection and digital sovereignty, the European GAIA-X project is therefore coming into focus as a potential remedy.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Flegal-rift-eu-usa-data-handling-data-transfer-implications-for-enterprises&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Digitisation &amp; Digitalisation</category>
      <category>Cloud-Computing</category>
      <category>Data Security</category>
      <pubDate>Thu, 04 Feb 2021 07:00:00 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/legal-rift-eu-usa-data-handling-data-transfer-implications-for-enterprises</guid>
      <dc:date>2021-02-04T07:00:00Z</dc:date>
    </item>
    <item>
      <title>Email encryption and archiving – it's that simple!</title>
      <link>https://blog.cryptshare.com/en/email-encryption-and-archiving-its-that-simple</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/email-encryption-and-archiving-its-that-simple" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/undefined-2.jpeg" alt="Email encryption and archiving – it's that simple!" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;&lt;br&gt;A partnership between two great companies makes customers the beneficiaries: By connecting Cryptshare to stanoc's archiving solution, we have created significant added value. We combined the protective encryption for sensitive messages and data in transit with auditable and legally compliant archiving for emails and attachments. Proof of how combining two innovative solutions can benefit users and protect their business communication effectively.&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/email-encryption-and-archiving-its-that-simple" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/undefined-2.jpeg" alt="Email encryption and archiving – it's that simple!" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;&lt;br&gt;A partnership between two great companies makes customers the beneficiaries: By connecting Cryptshare to stanoc's archiving solution, we have created significant added value. We combined the protective encryption for sensitive messages and data in transit with auditable and legally compliant archiving for emails and attachments. Proof of how combining two innovative solutions can benefit users and protect their business communication effectively.&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Femail-encryption-and-archiving-its-that-simple&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Archiving</category>
      <category>Partnership</category>
      <pubDate>Mon, 21 Dec 2020 14:25:46 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/email-encryption-and-archiving-its-that-simple</guid>
      <dc:date>2020-12-21T14:25:46Z</dc:date>
    </item>
    <item>
      <title>Beyond the EU-US Privacy Shield: What’s next for European enterprises?</title>
      <link>https://blog.cryptshare.com/en/eu-us-privacy-shield-whats-next-for-european-enterprises</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/eu-us-privacy-shield-whats-next-for-european-enterprises" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/undefined.jpeg" alt="Beyond the EU-US Privacy Shield: What’s next for European enterprises?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span&gt;On 16 July 2020, the ECJ (European Court of Justice) ruled the EU-US Privacy Shield invalid. It was not the first time this court made a splash on both sides of the Atlantic: The ruling clearly illuminated the fundamentally different perspectives – and priorities – of the European Union and the United States regarding data protection and data privacy. It has caused great uncertainty for many enterprises and presented them with challenges regarding how to handle data going forward. In the long-term, however, this ruling offers European enterprises valuable chances for reassessing data-driven business models and re-imagining them in a way that is compliant with the required protections of personal data. Things may not be so simple for US enterprises seeking trade in Europe.&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;div class="hs-embed-wrapper" style="position: relative; overflow: hidden; width: 100%; height: auto; padding: 0; max-width: 540px; min-width: 256px; display: block; margin: auto;"&gt; 
 &lt;div class="hs-embed-content-wrapper"&gt; 
  &lt;div style="position: relative; overflow: hidden; max-width: 100%; padding-bottom: 56.25%; margin: 0px;"&gt;   Please use a modern browser to watch this video.  
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/eu-us-privacy-shield-whats-next-for-european-enterprises" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/undefined.jpeg" alt="Beyond the EU-US Privacy Shield: What’s next for European enterprises?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span&gt;On 16 July 2020, the ECJ (European Court of Justice) ruled the EU-US Privacy Shield invalid. It was not the first time this court made a splash on both sides of the Atlantic: The ruling clearly illuminated the fundamentally different perspectives – and priorities – of the European Union and the United States regarding data protection and data privacy. It has caused great uncertainty for many enterprises and presented them with challenges regarding how to handle data going forward. In the long-term, however, this ruling offers European enterprises valuable chances for reassessing data-driven business models and re-imagining them in a way that is compliant with the required protections of personal data. Things may not be so simple for US enterprises seeking trade in Europe.&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;div class="hs-embed-wrapper" style="position: relative; overflow: hidden; width: 100%; height: auto; padding: 0; max-width: 540px; min-width: 256px; display: block; margin: auto;"&gt; 
 &lt;div class="hs-embed-content-wrapper"&gt; 
  &lt;div style="position: relative; overflow: hidden; max-width: 100%; padding-bottom: 56.25%; margin: 0px;"&gt;   Please use a modern browser to watch this video.  
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Feu-us-privacy-shield-whats-next-for-european-enterprises&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Best Practice</category>
      <category>Digitisation &amp; Digitalisation</category>
      <category>Data exchange</category>
      <pubDate>Wed, 07 Oct 2020 06:00:00 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/eu-us-privacy-shield-whats-next-for-european-enterprises</guid>
      <dc:date>2020-10-07T06:00:00Z</dc:date>
    </item>
    <item>
      <title>Digital working in local government: The good, the bad, and the ugly</title>
      <link>https://blog.cryptshare.com/en/digital-working-in-local-government-the-good-the-bad-and-the-ugly</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/digital-working-in-local-government-the-good-the-bad-and-the-ugly" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Government-Heroshot_06052020_thrid.jpg" alt="Digital working in local government: The good, the bad, and the ugly" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;&lt;br&gt;The past few months have made it abundantly clear that local government has been facing unprecedented challenges. With the ongoing pandemic, atop of all existing responsibilities, new challenges have risen to the forefront that need to be addressed swiftly and effectively. And if that weren’t enough, bad actors have reared their ugly heads: They took advantage of this situation and put local government in their crosshairs. Hard pressed CISOs may well ask: ‘Is there any good in this for public authorities?’&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/digital-working-in-local-government-the-good-the-bad-and-the-ugly" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Government-Heroshot_06052020_thrid.jpg" alt="Digital working in local government: The good, the bad, and the ugly" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;&lt;br&gt;The past few months have made it abundantly clear that local government has been facing unprecedented challenges. With the ongoing pandemic, atop of all existing responsibilities, new challenges have risen to the forefront that need to be addressed swiftly and effectively. And if that weren’t enough, bad actors have reared their ugly heads: They took advantage of this situation and put local government in their crosshairs. Hard pressed CISOs may well ask: ‘Is there any good in this for public authorities?’&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fdigital-working-in-local-government-the-good-the-bad-and-the-ugly&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Digitisation &amp; Digitalisation</category>
      <pubDate>Tue, 04 Aug 2020 06:00:00 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/digital-working-in-local-government-the-good-the-bad-and-the-ugly</guid>
      <dc:date>2020-08-04T06:00:00Z</dc:date>
    </item>
    <item>
      <title>Security with validated procedures: Cryptshare now ISO 27001 certified</title>
      <link>https://blog.cryptshare.com/en/cryptshare-now-iso-27001-certified</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/cryptshare-now-iso-27001-certified" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/ISO-Banner_1200x628_OG.jpg" alt="Security with validated procedures: Cryptshare now ISO 27001 certified" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;A great start to the new year: After successfully completing and passing all necessary audit tests, Cryptshare's software development process received &lt;a href="https://www.cryptshare.com/en/company/seals-certifications/"&gt;ISO 27001 certification&lt;/a&gt;. This is an important achievement that presents yet another milestone in our company’s journey. However, perhaps even more impressive and remarkable is the manner in which this certification was accomplished in record time. Earning ISO 27001 certification is another powerful confirmation to customers and partners worldwide that all underlying procedures for the quality of Cryptshare and its performance meet the highest standards in information security. &amp;nbsp;&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/cryptshare-now-iso-27001-certified" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/ISO-Banner_1200x628_OG.jpg" alt="Security with validated procedures: Cryptshare now ISO 27001 certified" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;A great start to the new year: After successfully completing and passing all necessary audit tests, Cryptshare's software development process received &lt;a href="https://www.cryptshare.com/en/company/seals-certifications/"&gt;ISO 27001 certification&lt;/a&gt;. This is an important achievement that presents yet another milestone in our company’s journey. However, perhaps even more impressive and remarkable is the manner in which this certification was accomplished in record time. Earning ISO 27001 certification is another powerful confirmation to customers and partners worldwide that all underlying procedures for the quality of Cryptshare and its performance meet the highest standards in information security. &amp;nbsp;&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fcryptshare-now-iso-27001-certified&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>About us</category>
      <pubDate>Tue, 21 Jan 2020 07:00:00 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/cryptshare-now-iso-27001-certified</guid>
      <dc:date>2020-01-21T07:00:00Z</dc:date>
    </item>
    <item>
      <title>What will be important for your data security in 2020</title>
      <link>https://blog.cryptshare.com/en/your-data-security-in-2020</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/your-data-security-in-2020" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Cryptshare-AG-Secure-all-the-way.jpg" alt="Cryptshare-AG-Secure-all-the-way" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;2019 is coming to an end. Time, to take a look forwards at what will affect the IT industry most in the coming year. Cryptshare's &lt;a href="https://in.linkedin.com/in/matthias-kess-171376/de"&gt;Matthias Kess&lt;/a&gt; (CTO), &lt;a href="https://de.linkedin.com/in/markus-wolfer-049551112"&gt;Markus Wolfer&lt;/a&gt; (Head of Sales DACH), and &lt;a href="https://de.linkedin.com/in/oliver-g%C3%A4ng-b83a7b8a"&gt;Oliver Gäng&lt;/a&gt; (CMO) recently attended the German conference for IT managers (DILK) as well as the member conference for the IT Security Association Germany (TeleTrusT) and they had a lively and fruitful exchange with a great group of experts. Our takeaway? The IT industry will keep its dynamic nature due to digitisation and digitalisation processes, the 5G network expansion, the increasingly recognised value of data, and the great challenges that will be posed to information security in the future. This will demand continued scrutiny by all to defend against the new threats which will emerge during the year. So it looks like 2020 will be yet another exciting year in IT.&lt;br&gt;&lt;br&gt;&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/your-data-security-in-2020" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Cryptshare-AG-Secure-all-the-way.jpg" alt="Cryptshare-AG-Secure-all-the-way" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;2019 is coming to an end. Time, to take a look forwards at what will affect the IT industry most in the coming year. Cryptshare's &lt;a href="https://in.linkedin.com/in/matthias-kess-171376/de"&gt;Matthias Kess&lt;/a&gt; (CTO), &lt;a href="https://de.linkedin.com/in/markus-wolfer-049551112"&gt;Markus Wolfer&lt;/a&gt; (Head of Sales DACH), and &lt;a href="https://de.linkedin.com/in/oliver-g%C3%A4ng-b83a7b8a"&gt;Oliver Gäng&lt;/a&gt; (CMO) recently attended the German conference for IT managers (DILK) as well as the member conference for the IT Security Association Germany (TeleTrusT) and they had a lively and fruitful exchange with a great group of experts. Our takeaway? The IT industry will keep its dynamic nature due to digitisation and digitalisation processes, the 5G network expansion, the increasingly recognised value of data, and the great challenges that will be posed to information security in the future. This will demand continued scrutiny by all to defend against the new threats which will emerge during the year. So it looks like 2020 will be yet another exciting year in IT.&lt;br&gt;&lt;br&gt;&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fyour-data-security-in-2020&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Best Practice</category>
      <pubDate>Thu, 19 Dec 2019 07:56:32 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/your-data-security-in-2020</guid>
      <dc:date>2019-12-19T07:56:32Z</dc:date>
    </item>
    <item>
      <title>5 tips to improve data security in the insurance industry</title>
      <link>https://blog.cryptshare.com/en/5-tips-data-security-insurance-industry</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/5-tips-data-security-insurance-industry" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Heroshot-Insurance-building-11122019_Blog.png" alt="Heroshot-Insurance-building-11122019_Blog" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;Cyberattacks pose a serious threat to the insurance industry. Time and again, cybercriminals prey on insurance companies and their customers, increasingly in the form of sophisticated and targeted attacks. So how can the insurance industry protect itself against such threats? We compiled 5 top tips for insurance companies to effectively improve their data security.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/5-tips-data-security-insurance-industry" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Heroshot-Insurance-building-11122019_Blog.png" alt="Heroshot-Insurance-building-11122019_Blog" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;Cyberattacks pose a serious threat to the insurance industry. Time and again, cybercriminals prey on insurance companies and their customers, increasingly in the form of sophisticated and targeted attacks. So how can the insurance industry protect itself against such threats? We compiled 5 top tips for insurance companies to effectively improve their data security.&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2F5-tips-data-security-insurance-industry&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Best Practice</category>
      <pubDate>Thu, 21 Nov 2019 13:00:00 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/5-tips-data-security-insurance-industry</guid>
      <dc:date>2019-11-21T13:00:00Z</dc:date>
    </item>
    <item>
      <title>Cryptshare for CCPA</title>
      <link>https://blog.cryptshare.com/en/cryptshare-for-ccpa</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/cryptshare-for-ccpa" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Stock%20images/Compliance%20Concept.%20Word%20on%20Folder%20Register%20of%20Card%20Index.%20Selective%20Focus..jpeg" alt="Compliance Concept. Word on Folder Register of Card Index. Selective Focus." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;Starting 01 January 2020, the California Consumer Privacy Act (CCPA) will take effect. Intending to provide more transparency on the collection, use, and sale of data, it provides consumers with more power to determine what happens to their information and who gets to use it. California is breaking new ground with this legislation in the USA. The CCPA is not only emblematic of the surging awareness about the value of personal data, it also sets the bar for future laws to come.&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/cryptshare-for-ccpa" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Stock%20images/Compliance%20Concept.%20Word%20on%20Folder%20Register%20of%20Card%20Index.%20Selective%20Focus..jpeg" alt="Compliance Concept. Word on Folder Register of Card Index. Selective Focus." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;Starting 01 January 2020, the California Consumer Privacy Act (CCPA) will take effect. Intending to provide more transparency on the collection, use, and sale of data, it provides consumers with more power to determine what happens to their information and who gets to use it. California is breaking new ground with this legislation in the USA. The CCPA is not only emblematic of the surging awareness about the value of personal data, it also sets the bar for future laws to come.&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fcryptshare-for-ccpa&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 24 Oct 2019 08:51:56 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/cryptshare-for-ccpa</guid>
      <dc:date>2019-10-24T08:51:56Z</dc:date>
    </item>
    <item>
      <title>Secure email needs to be far more than S/MIME and PGP</title>
      <link>https://blog.cryptshare.com/en/secure-email-needs-to-be-far-more-than-smime-and-pgp</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/secure-email-needs-to-be-far-more-than-smime-and-pgp" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/SMIME-risk_08272019_blue-EN-800x545.jpg" alt="SMIME-risk_08272019_blue-EN-800x545" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;Despite the eroding myth of regular email as a secure communication tool for messages and files, most emails are sent unencrypted, and business emails with valuable content are certainly no exception to that. So why has email encryption still not gone mainstream? A closer look reveals that for most users the majority of encryption solutions are simply not an option because there is too much (technical) effort involved. The prime example: S/MIME and PGP.&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/secure-email-needs-to-be-far-more-than-smime-and-pgp" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/SMIME-risk_08272019_blue-EN-800x545.jpg" alt="SMIME-risk_08272019_blue-EN-800x545" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;Despite the eroding myth of regular email as a secure communication tool for messages and files, most emails are sent unencrypted, and business emails with valuable content are certainly no exception to that. So why has email encryption still not gone mainstream? A closer look reveals that for most users the majority of encryption solutions are simply not an option because there is too much (technical) effort involved. The prime example: S/MIME and PGP.&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fsecure-email-needs-to-be-far-more-than-smime-and-pgp&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Tue, 08 Oct 2019 08:00:00 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/secure-email-needs-to-be-far-more-than-smime-and-pgp</guid>
      <dc:date>2019-10-08T08:00:00Z</dc:date>
    </item>
    <item>
      <title>Enterprises in the digital world</title>
      <link>https://blog.cryptshare.com/en/enterprises-in-the-digital-world</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/enterprises-in-the-digital-world" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Cryptshare_QUICK_Technology.jpg" alt="Cryptshare_QUICK_Technology" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;Today, most enterprises have successfully arrived in the digital world. They have realised digitisation’s great potential, understanding that they can only benefit from it if they embrace the coming changes. Naturally, digitisation’s transformative powers also confronted enterprises with challenges that needed to be mastered. And mastered they were – now, enterprises produce digital data of all kinds and formats in vast volume, routinely transferring it across their own firewalls.&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/enterprises-in-the-digital-world" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Cryptshare_QUICK_Technology.jpg" alt="Cryptshare_QUICK_Technology" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;Today, most enterprises have successfully arrived in the digital world. They have realised digitisation’s great potential, understanding that they can only benefit from it if they embrace the coming changes. Naturally, digitisation’s transformative powers also confronted enterprises with challenges that needed to be mastered. And mastered they were – now, enterprises produce digital data of all kinds and formats in vast volume, routinely transferring it across their own firewalls.&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fenterprises-in-the-digital-world&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 12 Sep 2019 06:55:55 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/enterprises-in-the-digital-world</guid>
      <dc:date>2019-09-12T06:55:55Z</dc:date>
    </item>
    <item>
      <title>Can today’s encryption withstand quantum computers?</title>
      <link>https://blog.cryptshare.com/en/can-todays-encryption-withstand-quantum-computers</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/can-todays-encryption-withstand-quantum-computers" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Data-security.jpg" alt="Data-security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="teaser-text"&gt; 
 &lt;p&gt;&lt;strong&gt;The technology of quantum computing offers many new and unprecedented possibilities for what technology is capable of doing. While ‘regular’ digital computers eventually run into problems posed by the laws of physics, quantum computers work differently and possess far superior computing powers. As a result, there are considerable implications for security regarding encryption and decryption of data.&lt;/strong&gt;&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/can-todays-encryption-withstand-quantum-computers" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Data-security.jpg" alt="Data-security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="teaser-text"&gt; 
 &lt;p&gt;&lt;strong&gt;The technology of quantum computing offers many new and unprecedented possibilities for what technology is capable of doing. While ‘regular’ digital computers eventually run into problems posed by the laws of physics, quantum computers work differently and possess far superior computing powers. As a result, there are considerable implications for security regarding encryption and decryption of data.&lt;/strong&gt;&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fcan-todays-encryption-withstand-quantum-computers&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Wed, 11 Sep 2019 14:06:38 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/can-todays-encryption-withstand-quantum-computers</guid>
      <dc:date>2019-09-11T14:06:38Z</dc:date>
    </item>
    <item>
      <title>befine Solutions AG became Cryptshare AG</title>
      <link>https://blog.cryptshare.com/en/befine-solutions-ag-became-cryptshare-ag</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/befine-solutions-ag-became-cryptshare-ag" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Cryptshare-AG-Secure-all-the-way.jpg" alt="Cryptshare-AG-Secure-all-the-way" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="teaser-text"&gt; 
 &lt;p&gt;&lt;strong&gt;On the 7th of May 2019, befine Solutions AG changed its company name to Cryptshare AG. In these times of so many new product developments and with a growing product family, it was time to reflect their significance to the company in the name as well as making the main tagline reflect Cryptshare’s full scope of applications.&lt;/strong&gt;&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/befine-solutions-ag-became-cryptshare-ag" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Cryptshare-AG-Secure-all-the-way.jpg" alt="Cryptshare-AG-Secure-all-the-way" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="teaser-text"&gt; 
 &lt;p&gt;&lt;strong&gt;On the 7th of May 2019, befine Solutions AG changed its company name to Cryptshare AG. In these times of so many new product developments and with a growing product family, it was time to reflect their significance to the company in the name as well as making the main tagline reflect Cryptshare’s full scope of applications.&lt;/strong&gt;&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fbefine-solutions-ag-became-cryptshare-ag&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Wed, 11 Sep 2019 09:37:25 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/befine-solutions-ag-became-cryptshare-ag</guid>
      <dc:date>2019-09-11T09:37:25Z</dc:date>
    </item>
    <item>
      <title>Collections #1-5: An Assessment</title>
      <link>https://blog.cryptshare.com/en/collections-1-5-an-assessment</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/collections-1-5-an-assessment" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cryptshare.com/fileadmin/cryptshare.com/Public/user_uploads/Images/Blog/2017/Data-protection.jpg" alt="Collections #1-5: An Assessment" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="teaser-text"&gt; 
 &lt;p&gt;&lt;strong&gt;The year 2019 has just started but already there has been major news of IT security breaches that have made headlines: Collection #1 and Collections #2-5 that followed shortly thereafter. They showed once again how much e-mail is targeted by hackers and cybercriminals and how important it is to take e-mail security seriously to protect yourself and especially your data from attacks.&lt;/strong&gt;&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/collections-1-5-an-assessment" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cryptshare.com/fileadmin/cryptshare.com/Public/user_uploads/Images/Blog/2017/Data-protection.jpg" alt="Collections #1-5: An Assessment" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="teaser-text"&gt; 
 &lt;p&gt;&lt;strong&gt;The year 2019 has just started but already there has been major news of IT security breaches that have made headlines: Collection #1 and Collections #2-5 that followed shortly thereafter. They showed once again how much e-mail is targeted by hackers and cybercriminals and how important it is to take e-mail security seriously to protect yourself and especially your data from attacks.&lt;/strong&gt;&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fcollections-1-5-an-assessment&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Wed, 11 Sep 2019 07:44:58 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/collections-1-5-an-assessment</guid>
      <dc:date>2019-09-11T07:44:58Z</dc:date>
    </item>
    <item>
      <title>Cryptshare AG launches QUICK Technology</title>
      <link>https://blog.cryptshare.com/en/cryptshare-ag-launches-quick-technology</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/cryptshare-ag-launches-quick-technology" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cryptshare.com/fileadmin/cryptshare.com/Public/user_uploads/Images/Blog/2019/Cryptshare-QUICK-Technology.png" alt="Cryptshare AG launches QUICK Technology" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="teaser-text"&gt; 
 &lt;p&gt;&lt;strong&gt;Cryptshare AG is proud to announce the release of patent-pending innovation eliminating the need for users to manage passwords for regular exchanges between communication partners, Cryptshare QUICK Technology. Included in the latest Cryptshare release on 25 June, QUICK ends all password troubles for users, establishing permanent secure connections, and at long last combines security for all data in transit with simplified usability.&lt;/strong&gt;&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/cryptshare-ag-launches-quick-technology" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.cryptshare.com/fileadmin/cryptshare.com/Public/user_uploads/Images/Blog/2019/Cryptshare-QUICK-Technology.png" alt="Cryptshare AG launches QUICK Technology" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="teaser-text"&gt; 
 &lt;p&gt;&lt;strong&gt;Cryptshare AG is proud to announce the release of patent-pending innovation eliminating the need for users to manage passwords for regular exchanges between communication partners, Cryptshare QUICK Technology. Included in the latest Cryptshare release on 25 June, QUICK ends all password troubles for users, establishing permanent secure connections, and at long last combines security for all data in transit with simplified usability.&lt;/strong&gt;&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fcryptshare-ag-launches-quick-technology&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Wed, 11 Sep 2019 07:41:11 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/cryptshare-ag-launches-quick-technology</guid>
      <dc:date>2019-09-11T07:41:11Z</dc:date>
    </item>
    <item>
      <title>Security issues leave cloud infrastructure vulnerable</title>
      <link>https://blog.cryptshare.com/en/security-issues-leave-cloud-infrastructure-vulnerable</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/security-issues-leave-cloud-infrastructure-vulnerable" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Data-security.jpg" alt="Data-security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="teaser-text"&gt; 
 &lt;p&gt;&lt;strong&gt;A newly discovered weak spot in the technology used to deliver cloud services enables criminals and governments to access information stored and processed in the cloud.&lt;/strong&gt;&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/security-issues-leave-cloud-infrastructure-vulnerable" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Data-security.jpg" alt="Data-security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="teaser-text"&gt; 
 &lt;p&gt;&lt;strong&gt;A newly discovered weak spot in the technology used to deliver cloud services enables criminals and governments to access information stored and processed in the cloud.&lt;/strong&gt;&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fsecurity-issues-leave-cloud-infrastructure-vulnerable&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Wed, 11 Sep 2019 07:05:12 GMT</pubDate>
      <guid>https://blog.cryptshare.com/en/security-issues-leave-cloud-infrastructure-vulnerable</guid>
      <dc:date>2019-09-11T07:05:12Z</dc:date>
      <dc:creator>Matthias Kess</dc:creator>
    </item>
    <item>
      <title>What happened to the German project DE-Mail?</title>
      <link>https://blog.cryptshare.com/en/what-happened-to-the-german-project-de-mail</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/what-happened-to-the-german-project-de-mail" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Data-security.jpg" alt="Data-security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="teaser-text"&gt; 
 &lt;p&gt;&lt;strong&gt;A group of delegates was wondering the same and asked the German federal government about the state of it. The answers they got support the impression that the officials could be equally unsure of the future success.&lt;/strong&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/what-happened-to-the-german-project-de-mail" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Data-security.jpg" alt="Data-security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="teaser-text"&gt; 
 &lt;p&gt;&lt;strong&gt;A group of delegates was wondering the same and asked the German federal government about the state of it. The answers they got support the impression that the officials could be equally unsure of the future success.&lt;/strong&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fwhat-happened-to-the-german-project-de-mail&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Tue, 10 Sep 2019 12:06:34 GMT</pubDate>
      <guid>https://blog.cryptshare.com/en/what-happened-to-the-german-project-de-mail</guid>
      <dc:date>2019-09-10T12:06:34Z</dc:date>
      <dc:creator>Niklas Boukal</dc:creator>
    </item>
    <item>
      <title>Map of Press Freedom 2018: Too few white spots</title>
      <link>https://blog.cryptshare.com/en/map-of-press-freedom-2018-too-few-white-spots</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/map-of-press-freedom-2018-too-few-white-spots" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Freedom-of-press-map-2018-reporters-sans-frontiers_SHARE.jpg" alt="Freedom-of-press-map-2018-reporters-sans-frontiers_SHARE" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="teaser-text"&gt; 
 &lt;p&gt;&lt;strong&gt;3rd May 2018 is World Press Freedom Day. A glance at the Reporters Without Borders (RSF) Index makes it clear that more ‘white spots’ on the map are desirable!&lt;/strong&gt;&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/map-of-press-freedom-2018-too-few-white-spots" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Freedom-of-press-map-2018-reporters-sans-frontiers_SHARE.jpg" alt="Freedom-of-press-map-2018-reporters-sans-frontiers_SHARE" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="teaser-text"&gt; 
 &lt;p&gt;&lt;strong&gt;3rd May 2018 is World Press Freedom Day. A glance at the Reporters Without Borders (RSF) Index makes it clear that more ‘white spots’ on the map are desirable!&lt;/strong&gt;&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fmap-of-press-freedom-2018-too-few-white-spots&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Tue, 10 Sep 2019 12:03:32 GMT</pubDate>
      <guid>https://blog.cryptshare.com/en/map-of-press-freedom-2018-too-few-white-spots</guid>
      <dc:date>2019-09-10T12:03:32Z</dc:date>
      <dc:creator>Anja Gruner</dc:creator>
    </item>
    <item>
      <title>Data protection violations in German doctor’s offices on the rise</title>
      <link>https://blog.cryptshare.com/en/data-protection-violations-in-german-doctors-offices-on-the-rise</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/data-protection-violations-in-german-doctors-offices-on-the-rise" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Healthcare_data_transfers.jpg" alt="Healthcare_data_transfers" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;State Commissioner for Data Protection and Freedom of Information for the state of Baden-Württemberg, Stefan Brink, PhD., warned in a press release about the increasing number of data breaches in doctor’s offices. Particularly in the medical field, where sensitive and personal data was dealt with, technical and organisational measures were “an absolute must”, he said. &lt;/strong&gt;&lt;br&gt;&lt;strong&gt;So it is high time for service providers in the medical field to look for solutions and secure their communication.&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cryptshare.com/en/data-protection-violations-in-german-doctors-offices-on-the-rise" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cryptshare.com/hubfs/Healthcare_data_transfers.jpg" alt="Healthcare_data_transfers" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;State Commissioner for Data Protection and Freedom of Information for the state of Baden-Württemberg, Stefan Brink, PhD., warned in a press release about the increasing number of data breaches in doctor’s offices. Particularly in the medical field, where sensitive and personal data was dealt with, technical and organisational measures were “an absolute must”, he said. &lt;/strong&gt;&lt;br&gt;&lt;strong&gt;So it is high time for service providers in the medical field to look for solutions and secure their communication.&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5912427&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cryptshare.com%2Fen%2Fdata-protection-violations-in-german-doctors-offices-on-the-rise&amp;amp;bu=https%253A%252F%252Fblog.cryptshare.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 01 Aug 2019 09:30:08 GMT</pubDate>
      <author>alexander.matthaeus@cryptshare.com (Alexander Matthäus)</author>
      <guid>https://blog.cryptshare.com/en/data-protection-violations-in-german-doctors-offices-on-the-rise</guid>
      <dc:date>2019-08-01T09:30:08Z</dc:date>
    </item>
  </channel>
</rss>
