Security Experts:

Email Security
long dotted


Many say that Hillary Clinton's use of a private email server breached rules about protecting classified documents from cyber attack and may have amounted to a crime. [Read More]
Panda Banker, an offspring of the infamous Zeus malware, was recently observed in a massive infection campaign where millions of spam messages were sent to potential victims. [Read More]
PhishMe, a company that helps organizations teach security awareness by educating employees on how to identify phishing attacks, today announced it has raised a whopping $42.5 million in funding. [Read More]
More than half of Alexa top 500 domains can be spoofed because their owners failed to properly configure email authentication [Read More]
Business email compromise (BEC) scams have resulted in losses of $3.1 billion from 22,000 victims as of May 2016. [Read More]
A vulnerability in Verizon’s webmail service could have been exploited by hackers to silently forward emails [Read More]
Thousands of Let's Encrypt users saw their email addresses being exposed when the open certificate authority (CA) started sending a notification to active subscribers. [Read More]
$2.3 billion stolen from 17,642 victims in at least 79 countries. These are the current figures for the growing scourge known as business email compromise (BEC). [Read More]
German federal CERT (CERT-BUND) warned that malicious emails containing fake invoices as Word documents contain a personal salutation and business role of the receiver. [Read More]
An official inquiry has found serious shortcomings in how US presidential candidate Hillary Clinton in her former post as secretary of state managed the security of their emails. [Read More]

FEATURES, INSIGHTS // Email Security

rss icon

Alan Wlasuk's picture
Let’s look at what e-mail hacking is really all about and why it could be much more painful than just having to sort through our spouse’s energy drink messages.
Greg Olsen's picture
Transport Layer Security is a means of securing the transmission of email between two MTAs (mail transfer agents). In this column, I’ve highlighted some of the other things that can be done with TLS besides this opportunistic encryption of email.
Greg Olsen's picture
Inbound email to your firm containing important communications related to revenue or customer service could be blocked by your own anti-spam software. How can you prevent against false positives?
Greg Olsen's picture
Interest in Converged Infrastructure solutions has been surging due to the demands of cloud computing. This trend toward Converged Infrastructure has important implications for the email security IT infrastructure.
Greg Olsen's picture
Thinking of migrating mailboxes to a cloud provider? The email backbone is an important architectural tool when dealing with the migration of email mailboxes and maintaining email integrity during the migration process.
Greg Olsen's picture
These best practices for DKIM can help you get more email delivered and lower the likelihood that a message will be categorized as spam.
Greg Olsen's picture
The driver for choosing SaaS as a deployment model is typically cost. But SaaS as a model for CRM can have a downside when it comes to email—the potential for deliverability problems.
Greg Olsen's picture
One of the best ways to optimize security for messaging infrastructure is to leverage the power of something already deployed—the corporate directory.
Greg Olsen's picture
Enterprises today need to not only understand how Data Leak Prevention (DLP) impacts their organization, but also need to be aware of DLP specifically as it relates to email.
Greg Olsen's picture
DKIM (DomainKeys Identified Mail) was created as an Internet standard method of instilling trust back in email. These best practices around DKIM verification outline what organizations should consider in order to trust email and prevent phishing.