Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.

The myriad routines connected to them have made smartphones essential tools in our work and private lives. These days, mobile devices account for over half of global web traffic. Unsurprisingly, cybercriminals have also set their sights on this goldmine of data. Consumers and organizations alike have seen a surge in attacks on mobile devices due to the global shift to remote work.To explore the quickly changing landscape of mobile threats and how mobile security can be increased, we spoke to ex-NSA engineer and Glacier’s co-founder Alex White. Having witnessed the growing demand for security in the mobile market, Glacier’s team is on a mission to offer tailor-made protection for high-risk devices and individuals.If you want to hear more about techniques to protect mobile data, the NSA’s ways of working, and some highlights from the privacy scene, listen to our podcast- hosted by Balázs Judik.

Rapid innovation should be counterbalanced by sensible security measures to protect our lives in the virtual space and, so far, encryption has proved to incredibly useful in doing just that. Encryption is after all the through-line of our daily digital routines, and is present (or should be present) in every message, transaction and video call you receive.Our next podcast guest, prominent cybersecurity expert Gus Hunt, also shares our enthusiasm for all things encrypted. With experience working across the C-Suite in both government and private roles within the CIA and Accenture, Gus provides a unique outlook on both the case for strong encryption and the challenges it can present to law enforcement agencies.Expect to get the low down on space exploration, intelligence service insights, encryption backdoors and much more in the next episode of under CTRL!

Some associate airports with the excitement of travel, others think of them as transit points for business travel. However you view them, airports need to operate like clockwork and everyone – from employees to passengers – must follow a carefully controlled script. That said, we rarely take the time to reflect on the complex processes that guide these operations.With this in mind, we wanted to gain insights from an airport operator about their facilities digital journey. Enter Cologne Bonn Airport’s Dr. Demian Pitz, who took the time to walk us through some of the airport’s transformation projects - explaining how Tresorit now helps the airport communicate securely with internal teams and external partners. 

In our highly interconnected world, data is the fuel that keeps the digital economy up and running. Companies and platforms of all shapes and sizes are collecting, sharing and selling the personal information of their users without explicit consent to do so. We believe it’s time to regain ownership of your data by removing your private information from search results.This is a sentiment shared by fellow privacy advocate and DeleteMe founder Rob Shavell, who helps us shed light on the complexities of data collection & brokerage in the latest episode of under CTRL. We also explore how DeleteMe helps users minimize their digital footprint by removing their personal information from data broker sites.Are you ready to vanish from the digital map and start afresh in your own private world? Listen to our episode for more expert advice to find out how.

The security of the New World we are building online is heavily dependent on password security but, despite this, password reuse and negligence continue to be a problem for the world’s Web users. This lax approach has created the ideal environment for hackers to thrive,  as leaked credentials become replicated across the clean and dark web. To help explore the mechanisms that power these exchanges, we’ve recruited security evangelist and Have I Been Pwned founder Troy Hunt to join our resident cryptographic expert (and Tresorit CEO) Istvan Lam on under CTRL. Stay tuned for news on the biggest threats in cyberspace, the logic behind staying quiet about data breaches and insight into some of the most infamous data breaches of all time. 

2020: the year of the cyberattack – and the year that security services levelled up to combat this growing threat. Today on under CTRL, we’re joined by Laszlo Borsy - cybersecurity advocate and VP of Business Development at White Shark, a managed security services company based out of our hometown Budapest.White Shark represents a new breed of security agency, and one that adopts a holistic, risk-driven approach to security in order to protects its clients against ransomware and phishing. Expect eyebrow raising stories from the murky world of industrial espionage, the strategies security experts use to track down system vulnerabilities and more! 

Going online can expose children to new risks from cyberbullying, online predators, self-harm to uncensored content and targeted ads. The traditional protections we place around children are no longer effective in cyberspace, but can an app really help to prevent harmful situations both online and offline?Today, under CTRL is joined by Bark's Chief Parenting Officer Titania Jordan to discuss online privacy for children. Bark is an AI-driven platform that provides a new way to protect the online lives of children – flagging concerning behaviour through its dashboard and providing parents with the ability to access recommendations to confronting suspicious activity and harmful situations in a considerate manner.You can learn more about todays guest Titania Jordan on LinkedIn  and https://bark.us. You can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com https://www.linkedin.com/in/titaniajordan/

Luke describes Brave as a “privacy browser with the first kind of integrated global private ad and reward platform”. By blocking trackers that allow platforms to create detailed audience profiles, Brave provides users with a “real clean start” and a browser experience that’s 3 times faster than Google.Having started his career in advertising, Luke is one of the many marketing professionals who witnessed the rise of tech monopolies and became alarmed at the industry’s approach to data and targeting. You can learn more about todays guest Luke Mulks on LinkedIn  and https://brave.com. You can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com

Our search engine knows often more about us than our best friends – thanks to the data trails we leave as we are seeking answers to common and sensitive questions across the web. Is there a real choice, a private alternative for online search and navigation, without dismantling the boundaries of our privacy? The answer is clearly and reassuringly: YES. The privacy violation in the digital space is so far-reaching that people can only see the top of the iceberg. The behavioral-based advertising works so cleverly that users cannot even notice that they are trapped in an intellectual isolation called “filter bubble”. Kamyl warns of the damaging consequences of this: not just a biased world view, but this can be a real hotbed for misinformation and radicalization.You can learn more about todays guest Kamyl Bazbaz on LinkedIn  and https://duckduckgo.com. You can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com 

Phil Zimmermann creator of Pretty Good Privacy and Co-Founder of SilentCircle and István Lám, CEO of Tresorit discuss the recent press report from EU - "Draft Council Resolution on Encryption". Why are the five Eyes putting forward a proposal to expand “targeted lawful access” and what potential impact will this have on privacy? Is there a potential solution that can have a balanced outcome for both sides? With quantum computing on the horizon, does it even matter? There is an ongoing review by the senate on section 230. Can backdoors and social networks be intertwined? Join in for the answers.You can learn more about todays guest on philzimmermann.com. You can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.comRelated article: https://techcrunch.com/2020/11/09/whats-all-this-about-europe-wanting-crypto-backdoors/ 

How can "machine learning" tell if a goverment ID is genuine or fake? How does Revolut and other neobanks benefit from such services? How does Onfido support airport check-ins in parallel with connecting COVID19 test results to your digital identity? CEO and Co-Founder of Onfido, Husayn Kassai will shed light on these topics.  You can find todays guest on https://linkedin.com/in/husaynkassai and learn more about Onfido on https://onfido.com. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com

How do Pharma companies handle ultra sensitive data whilst some of the largest companies are racing to develop COVID-19 vaccination? CTO and Data Protection Officer of Adamas Consulting Group, Matt Barthel sheds some light on this complex matter. We discuss clinical trials, data security and compliance within this highly regulated industry and touch on the privacy challenges COVID-19 has brought upon healthcare.You can find todays guest on https://www.linkedin.com/in/matt-barthel-dip-rqa-mrqa-ispe-iapp-53991515/ and learn more about Adamas Consulting Group on https://www.adamasconsulting.com. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com

In a world monopolised by tech giants, where data is being constantly abused and manipulated by corporations and governments alike - how does privacy and freedom of speech survive? We chat about everything from surveillance capitalism to regulations with Edward Shone, the PR Manager of ProtonMail.You can find todays guest on https://www.linkedin.com/in/edward-shone-1b8aa641 and learn more about ProtonMail on https://protonmail.com. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com

Come along with us as we venture into the exclusive world of VIPs and discuss what physical and cybersecurity means to high-end clients. Walking us through the challenges of providing the highest levels of safety and privacy to a global customer base is Maria Olshanskaya, Co-Founder and Active Partner of Tel Aviv’s Aera Global Corp.You can find todays guest on https://linkedin.com/in/mariaolshanskaya/ and learn more about Aera Global on https://aera.global. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com

With the Schrems 2 ruling finalized in July, how will enterprise data protection be affected? What is the future of the EU-US Privacy Shield? We chat with Jitty van Doodewaerd from DMCC who was formerly part of the Big Data Expert Group of the Dutch Ministry of Economic Affairs.You can find todays guest on https://www.linkedin.com/in/jitty-van-doodewaerd-0424816/ and learn more about DMCC Netherlands on https://dmcc.nl/. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn @linkedin.com/company/tresorit/ and learn more about our company on www.tresorit.com 

Join us as we sail off into the sea to discuss how human-centric roles such as hospitality, and different generations all successfully coexist with technology and data security. Helping us navigate the waters is Hornblower Cruises and Events HR manager Codi Robbins from California. You can find todays guest on https://www.linkedin.com/in/codirobbins/ and learn more about Hornblower on https://www.hornblower.com. And if you want to know what we are up to you can follow us on twitter @tresorit and LinkedIn and learn more about our company on www.tresorit.com

This time we’ll be diving into the FinTech world and discuss digital transformation and the role cybersecurity plays in this ever evolving world. Joining us from Atlanta, USA, we have Wipfli senior manager Jim Rumph who’ll walk us through what effective risk management and compliance should look like to ensure success and growth.You can find todays guest on www.linkedin.com/in/jimrumph/ and learn more about Wipfli on www.wipfli.com. And if you want to know what we are up to you can follow us on twitter @tresorit and instagram @tresorit_co and learn more about our company on www.tresorit.com

Data protection? Compliance? Regulations? We chat with CEO and founder of Patronous Wealth, Romesh Atapattu about all things digital within the extremely secure world of asset management. Listen to some incredible true stories as we try to answer the question — is it possible for private wealth management to go online?You can find todays guest, Romesh Atapattu on LinkedIn and learn more about Patronous Wealth on www.patronuswealth.com. And if you want to know what we are up to you can follow us on twitter @tresorit and instagram @tresorit_co and learn more about our company on www.tresorit.com

Remember the old days when we used pen and paper? Come along with us as we discuss this gigantic shift in the way we work. We delve into security’s and technology’s influence with Christoffer Lindblad — a founding partner or the nordic leadership service firm Pelago.You can find todays guest, Christoffer Lindblad on linkedin.com/in/christofferlindblad/ and learn more about Pelago on www.pelago.se. And if you want to know what we are up to you can follow us on twitter @tresorit and instagram @tresorit_co and learn more about our company on www.tresorit.com

Join us as we embark on a journey to discover what electronic crimes are all about, what role technology plays within law enforcement and what’s life like in the COVID-19 era, with detective Tony Van Der Haar from Boone County Sheriff office in northern Kentucky, USA.You can learn more on www.boonesheriff.com. If you want to know what we are up to you can follow us on Twitter @tresorit and Instagram @tresorit_co and learn more about our company on www.tresorit.com