riproduciamo di seguito un articolo di Andrea Marucci, che chiarisce alcuni semplici concetti relativi alla PEC, con un ns. comento in calce relativo alla validità (o […]
The rapid development and increasing interconnectedness of internal and external business processes and the challenges this poses places new demands on companies. In addition to the […]
As many know, email is not naturally well suited for sending large file attachments. Most email providers enforce file size limitations on email attachments. One can […]
The General Data Protection Regulation (GDPR), the most important change in data privacy in 20 years, will take effect on May 25, 2018. The impact for […]
Part 3 of our series: “Done any tricks today?“ addresses solutions for ensuring verifiable and secure e-mail correspondence. In addition, we should not forget the EU […]
The aim of this third and final article is to explain why the activation of TLS (Transport Layer Security) on in-house e-mail systems does not definitively […]
In the first part of this series of articles, we dealt with the issues surrounding the procurement and targeted use of encryption solutions, particularly in the […]