Security Experts:

Email Security
long dotted


Google has updated Gmail spam filters to block out emails coming from addresses using suspicious combinations of Latin and non-Latin characters, the company said on Tuesday.
Ben Williams, a senior security consultant at global information assurance specialist NCC Group, has showed that while email and Web filtering products and services play an important role in protecting an organization against cyber threats, their flaws can be leveraged in the reconnaissance phase of an attack.
Microsoft said it is scrambling Outlook email messages in transit to thwart spying by governments or others.
IT security professionals aren’t getting the business expertise skills they need at their current companies and positions, and are therefore looking elsewhere.
The minds behind want to keep TrueCrypt encryption software alive - either by picking up where the original developers left off or building on their code to create a new product.
A new push to encrypt email, keeping messages free from government snooping, is gaining momentum.
AOL said it had launched an investigation with federal authorities into a security breach that allowed hackers to gain access to around two percent of its email accounts.
AT&T is offering a new cloud-based security solution designed to protect customers against malware and malicious websites while offering security policy control across enterprise, web, social and mobile networks.
The 'Darlloz' worm is going after your digital dollars, as well as devices that make up the Internet of Things, according to new research
Google announced that its Gmail service would use added encryption to protect against eavesdropping and keep messages secure.

FEATURES, INSIGHTS // Email Security

rss icon

Greg Olsen's picture
Interest in Converged Infrastructure solutions has been surging due to the demands of cloud computing. This trend toward Converged Infrastructure has important implications for the email security IT infrastructure.
Greg Olsen's picture
Thinking of migrating mailboxes to a cloud provider? The email backbone is an important architectural tool when dealing with the migration of email mailboxes and maintaining email integrity during the migration process.
Greg Olsen's picture
These best practices for DKIM can help you get more email delivered and lower the likelihood that a message will be categorized as spam.
Greg Olsen's picture
The driver for choosing SaaS as a deployment model is typically cost. But SaaS as a model for CRM can have a downside when it comes to email—the potential for deliverability problems.
Greg Olsen's picture
One of the best ways to optimize security for messaging infrastructure is to leverage the power of something already deployed—the corporate directory.
Greg Olsen's picture
Enterprises today need to not only understand how Data Leak Prevention (DLP) impacts their organization, but also need to be aware of DLP specifically as it relates to email.
Greg Olsen's picture
DKIM (DomainKeys Identified Mail) was created as an Internet standard method of instilling trust back in email. These best practices around DKIM verification outline what organizations should consider in order to trust email and prevent phishing.
Greg Olsen's picture
When considering policy-based email encryption, there are best practices that an organization can follow for policy-based email encryption.
Greg Olsen's picture
Email is a primary mode of communication in business today and consequently is a mission critical enterprise application. A well-designed corporate email infrastructure should have a security architecture built on the bastion host principle.
Nicholas Filippi's picture
The past two years have seen significant rise in the adoption of cloud computing and Software-as-a-Service (SaaS), however the ever-present concern over security has greatly impacted its growth within email security.