
There are always new attempts by governments to systematically monitor Internet users for no reason. However, mass surveillance is not only unsuitable for fighting crime, it is also completely incompatible with democratic principles and poses a considerable threat to data security.
Read moreStarting today, Threema’s innovative new desktop app is available to all iOS users as a stable beta version that can be used as a daily driver.
At the end of 2022, the European Union launched a set of regulations (NIS2, DORA, and CER) that aim to reduce vulnerabilities for cyberattacks in organizations and strengthen the physical resilience of critical entities. The scope of the new legal framework is wide-ranging and imposes profound changes on organizations. Webinar About NIS2, DORA, and CER In our webinar on the subject, Rodrigo López Crespo, Criminal and Cybersecurity Lawyer at Monereo Meyer Abogados, and Miguel Rodríguez, Chief Revenue Officer at Threema, talk about business communication in view of the NIS2, DORA, and CER regulations. The webinar is available as an on-demand recording. Watch now
Wouldn’t it be great to receive error messages or automated notifications conveniently as a text message? Threema Gateway allows you to set up such integration and automation processes.
When it comes to cryptographic protocols, a formal security proof is the ultimate hallmark of quality. German researchers now provide such a proof for the Ibex protocol, confirming that Threema’s security is based on a rock-solid foundation.
Can you imagine working without email? You’re not the only one who can’t: for decades, email has been an integral part of corporate communication. Even though several other online communication services have emerged since the first email was sent in the 70s, many studies have shown that email still is the most used communication channel. So why should it be replaced or complemented with instant messaging?