
What’s a transport agent and how does it work?
Learn what a transport agent is and understand how it routes email messages between users and manages deliveries.
Read articleIn today's climate of data security, it's a serious risk to go unencrypted. Find out how to protect your emails and share sensitive information without risk.
Learn what a transport agent is and understand how it routes email messages between users and manages deliveries.
Read articleLearn how enabling S/MIME brings several advantages to your organization's email security.
Read articleTraditional message encryption protocols such as PGP have often thrown up barriers for both sender and recipient. They remain too technical and complex for the average user, resulting in potentially low adoption rates.
Read articleTransport layer security (TLS) is widely used and many governing bodies recommend it. But how does it work, and what are the potential drawbacks?
Read articleEmail encryption is recommended under EU and UK GDPR - but why? And what are the exact requirements?
Read articleUnderstand the risks of going without email encryption as well as the benefits it could bring to your business.
Read articleLearn how to keep your data safe by easily sending and opening encrypted emails within Outlook.
Read articleEncrypted email should be a key part of every business' cybersecurity strategy. Find everything you need to know here.
Read articleSharing data is something we all need to do - but how do we make the process secure? Find out in our latest guide.
Read articleContent analysis uses contextual machine learning and DLP policies to check an email’s content against intended recipients in order to spot any abnormal behaviour and prevent a security breach before it can even happen.
Read articleEmail encryption can be complicated. That's why we've created this simple guide which breaks down different types of encryption, so you can decide what works best for your business,
Read articleAs a communication method and for sharing data, email is as popular as ever. Despite the influx of other messaging and online secure file sharing solutions, it remains the most widely used tool for organisations to transmit and receive sensitive data.
Read articleSending emails via Microsoft 365? Learn how to encrypt them and keep your data safe.
Read articleLearn how to give your recipients secure and seamless access to encrypted email content.
Read articleLooking at a few of the oldest known ciphers, which demonstrate the fundamentals of encryption.
Read articleThis post will focus on a columnar transposition cipher – a slightly more advanced transposition cipher that produces very different results.
Read articleThe basic idea of a substitution cipher is a simple one: take one letter in your message, let’s say ‘A’, and replace it with a different letter, such as ‘E’. Sounds familiar?
Read articleRegardless of what you make of the ethics of the Edward Snowden revelations from 2013, the one thing that can be said confidently is that they started a global discussion about the safety and security of our data
Read articleThe Vigenère cipher is a polyalphabetic substitution cipher and offers some defence against letter frequency analysis. In essence, rather than using a single alphabet when encrypting information, we make use of multiple alphabets – 26 of them to be precise.
Read articleEmail encryption and authentication are vital for keeping your comms secure. Find out how to make the process pain-free for your recipients.
Read articleUnderstand how encryption works and the benefits it can bring to anyone working in the security space.
Read articleIf current trends continue, in the not too distant future all organisations will use hosted mailboxes. The huge uptake and success of Office 365 for mail services indicates that the days of on-premise mailboxes are numbered
Read articleRemove sensitive data from outlook emails and attachments to prevent high-risk data breaches
Read articleNHS trusts have been banned from purchasing new fax machines, as part of a modernisation effort that will phase out the technology completely by 2020 and improve NHS data standards.
Read articleMany Egress users may have heard recently about the security flaws discovered in PGP and S/MIME. The vulnerabilities can mean that messages encrypted using these methods are vulnerable to attacks.
Read articleDifferent organization have different data security needs, often dictated by industry regulations. For organizations wanting to secure data in transit, but happy for recipients to receive the email in clear text, TLS encryption can be applied.
Read articleTraditional message encryption protocols such as PGP have often thrown up barriers for both sender and recipient.
Read articleA new study has shown that HTTPS interception, the practice of decrypting and scanning HTTPS connections to monitor traffic for security vulnerabilities, is a much more common feature in security software processes than first thought.
Read articleEgress Prevent uses machine learning and advanced data analytics to secure and protect your sensitive email communications.
Read articleWorking with Outlook? Find out how to securely encrypt your emails in transit.
Read articleCheck out the five best reasons to start using email encryption today.
Read articleEmail encryption software is a valuable business tool. Learn how it works in our latest guide.
Read articleNetwork layer encryption involves encrypting data as it is sent from one node, and decrypting it on arrival at another. When done correctly this approach plays a valuable role in the “defense in-depth” approach to security by adding a vital layer of encryption on data at the network layer.
Read articleA lot of messaging technology that has been invented recently uses end-to-end encryption, but most emails are not sent like this. A typical email provider relies on the Simple Mail Transfer Protocol (SMTP) to encrypt emails during transmission, often using Transport Layer Security (TLS).
Read articleFinding an email security solution that prevents data breaches and keeps your system protected can be difficult. Most importantly, your organization needs security protocols that are reliable, easy to use and cost-effective – and ideally integrate seamlessly with your existing IT infrastructure.
Read articleFind out everything you need to now about TLS email encryption in our latest guide.
Read articleS/MIME is a security protocol that digitally signs and encrypts emails. Learn how it works and why it could benefit your business.
Read articleYou've probably heard about email encryption. But what are the tangible benefits encryption software can bring to your business?
Read articleBusinesses must keep their email safe. Learn more about what enforced email encryption is and why your business needs it.
Read articleThe search for an email encryption solution that suits your organisation’s needs can be a bewildering experience.
Read articleFind the answers you need from our bank of first-hand research and thought leadership.
View all cybersecurity topics