DKIM (DomainKeys Identified Mail) was created as an Internet standard method of instilling trust back in email. These best practices around DKIM verification outline what organizations should consider in order to trust email and prevent phishing.
Email is a primary mode of communication in business today and consequently is a mission critical enterprise application. A well-designed corporate email infrastructure should have a security architecture built on the bastion host principle.
The past two years have seen significant rise in the adoption of cloud computing and Software-as-a-Service (SaaS), however the ever-present concern over security has greatly impacted its growth within email security.
Social Media Use Policy - The consumerization of IT is affecting all aspects of the way we work. As Web 2.0 technologies continue to gain popularity amongst employees, IT departments are struggling to understand and manage the challenges.