Security Experts:

Email Security
long dotted

NEWS & INDUSTRY UPDATES

Research from Venafi found that access to the personal email server used by former U.S. Secretary of State Hillary Clinton was not encrypted or authenticated by a digital certificate for the first three months of her term. [Read More]
Security experts share thoughts on Hillary Clinton's use of personal email for conducting official government business. [Read More]
The recently launched Outlook for iOS is a “security nightmare” for companies, a researcher warned on Thursday. [Read More]
An email scam which targets businesses with bogus invoices has netted more than $214 million from victims in 45 countries in just over one year, an FBI task force said Thursday. [Read More]
Network security firm Fortinet today announced that its sandboxing solution, FortiSandbox, is now available as a virtual appliance. [Read More]
jQuery.com, the official website for the popular JavaScript library, has been compromised for a second time in less than a week. [Read More]
Agari, a provider data-driven security solutions that help detect email-based cyberattacks, has raised $15 million Series C funding round led by Scale Venture Partners. [Read More]
Bitdefender is warning the employees and IT administrators of small and medium-sized businesses (SMBs) to be on the lookout for fake emails designed to distribute information-stealing malware. [Read More]
Symantec said it will replace its nine Norton products with one flagship solution: Norton Security, which will combine the functionality of existing products. [Read More]
Google has updated Gmail spam filters to block out emails coming from addresses using suspicious combinations of Latin and non-Latin characters, the company said on Tuesday. [Read More]

FEATURES, INSIGHTS // Email Security

rss icon

Greg Olsen's picture
Transport Layer Security is a means of securing the transmission of email between two MTAs (mail transfer agents). In this column, I’ve highlighted some of the other things that can be done with TLS besides this opportunistic encryption of email.
Greg Olsen's picture
Inbound email to your firm containing important communications related to revenue or customer service could be blocked by your own anti-spam software. How can you prevent against false positives?
Greg Olsen's picture
Interest in Converged Infrastructure solutions has been surging due to the demands of cloud computing. This trend toward Converged Infrastructure has important implications for the email security IT infrastructure.
Greg Olsen's picture
Thinking of migrating mailboxes to a cloud provider? The email backbone is an important architectural tool when dealing with the migration of email mailboxes and maintaining email integrity during the migration process.
Greg Olsen's picture
These best practices for DKIM can help you get more email delivered and lower the likelihood that a message will be categorized as spam.
Greg Olsen's picture
The driver for choosing SaaS as a deployment model is typically cost. But SaaS as a model for CRM can have a downside when it comes to email—the potential for deliverability problems.
Greg Olsen's picture
One of the best ways to optimize security for messaging infrastructure is to leverage the power of something already deployed—the corporate directory.
Greg Olsen's picture
Enterprises today need to not only understand how Data Leak Prevention (DLP) impacts their organization, but also need to be aware of DLP specifically as it relates to email.
Greg Olsen's picture
DKIM (DomainKeys Identified Mail) was created as an Internet standard method of instilling trust back in email. These best practices around DKIM verification outline what organizations should consider in order to trust email and prevent phishing.
Greg Olsen's picture
When considering policy-based email encryption, there are best practices that an organization can follow for policy-based email encryption.