Paubox_Primary_color Paubox SVG logo white
Products
Products
EMAIL SECURITY
MOST POPULAR
Vector
Inbound email security
AI-powered email threat protection
Vector (1)
Data loss prevention
Safeguard against data loss caused by human error
COMPLIANCE
MOST POPULAR
Vector (2)
Email encryption
Encrypted email for Google and Microsoft
Vector (3)
Archiving
Preserve email for compliance audits
ENGAGEMENT
Vector (4)
Email marketing
Build, send, and track HIPAA compliant email campaigns
Vector (5)
Email API
Transactional email 
for app developers
Vector (6)
Forms
Compliant intake forms
LIVE WEBINARS
PRODUCT WEBINAR
HIPAA compliant email security 101: PHI, encryption, and what's required
Learn how HIPAA applies to email communications, what qualifies as PHI, and how encryption helps healthcare organizations meet compliance requirements.
Save your spot
Solutions
Solutions
BY SIZE
Vector (8)
Small organizations
Vector (9)
Mid-size organizations
Vector (10)
Enterprise
BY INDUSTRY
Vector (11)
Healthcare
Vector (12)
Insurance
Vector (13)
Education
BY PLATFORM
Vector (15)
Paubox for Google Workspace
Vector (15)
Paubox for Microsoft 365
PARTNERS
Vector (16)
Partners
Opportunities for solutions partners
Pricing
Resources
Resources
LEARN
Vector (18)
Blog
Vector (19)
Customer stories
Vector (20)
Webinars
Vector (21)
Events
EVALUATE
Vector (15)
Why choose Paubox?
PRODUCT RESOURCES
Vector (23)
Help center
Vector (24)
Developer docs
RESEARCH
Vector (26)
View all research
Blog
Partners
Contact
Sign in
Start for free
Contact
Sign in
Start for free

Paubox blog

Coverage on some of the most important topics in healthcare, like HIPAA compliance, and secure and encrypted email.

Image of code.

GitHub incident shows how poisoned developer tools can expose code

Read more
Image of neon orange email icons.

Better email security starts with easier access

Read more
Image of code with the word "hacked" written.

Microsoft Exchange zero-day exploit headlines Pwn2Own Berlin Day Two

Read more
Image of a gavel.

Medtronic faces class action over alleged data security failure

Read more
Image of people in a conference room.

The limits of phishing training in healthcare

Read more
Image of a lock.

Understanding layered trust boundaries

Read more
Image of a glowing lock.

Why identity infrastructure is a target for cyber attacks

Read more
smartphone with security shield

What is a cybersecurity asset inventory?

Read more
laptop with hand on keyboard

The small security gaps that attackers look for first

Read more
world map

Lawful access bill sparks cross-border cybersecurity concerns

Read more
medical symbol

What is a plan sponsor under HIPAA?

Read more
medical symbol on document

Why employers cannot freely access employee health plan data

Read more
1 2 ... 16

Newsletter

Subscribe to Paubox Weekly

Every Friday we bring you the most important news from Paubox. Our aim is to make you smarter, faster.

Paubox SVG logo white

Secured by Paubox Badge

r2 HITRUST Badge

 

Products
  • Paubox Email Suite
  • Paubox Marketing
  • Paubox Email API
Resources
  • Blog
  • HIPAA Compliant Email: The Definitive Guide
  • 2026 Healthcare Email Security Report
  • Integrations
  • Developer docs
  • System status
  • Help center
Company
  • About
  • Paubox Foundations
  • Careers
  • Paubox Kahikina Scholarship
  • Security
  • Business Associate Agreement
  • HITRUST letter of certification
  • Events
  • AI use policy
  • Press room
  • Contact us
  • Terms of service
  • Acceptable use policy
  • Privacy policy

© 2026 Paubox, Inc.