Digital Transformation.
Powered by Security.
Don't have an account yet? Register now to make sure you don't miss any news and to access exclusive content for professionals.
By 2026, Switzerland will no longer be merely an observer of global tensions, but increasingly a part of an uncertain and volatile environment itself. Espionage, disinformation, and cyberattacks are affecting companies and institutions more directly and frequently today than they did just a few years ago.
While in 2022 we were still hoping that the global jungle of laws would somehow clear up, today we have to realize that The geopolitical weather has become much stormier. Sovereignty is no longer a luxury, but life insurance for your data. In a world in which intergovernmental agreements are shaking faster than a house of cards, the question arises: who can you still trust?
In an assessment of "Microsoft online services", a working group of the Data Protection Conference (AG DSK) concludes (PDF) that the encryption of processed data is regularly not possible, for example when data is displayed in the browser...
If you use several cloud services connected in a sequence of a business process, we speak of multi-cloud usage. The chances are high that the same data and cloud services are used in several of your company's business processes.
In the fourth part of our series on data residency, we look at the various encryption techniques and examine their advantages and disadvantages. Messages and information have been encrypted since ancient times. The modern era...