Security Experts:

Email Security
long dotted


Adobe security team accidentally publishes private PGP key on its blog [Read More]
A helpdesk vulnerability exposes the internal communications of hundreds of companies, researcher warned [Read More]
Security researchers have proposed a methodology for effectively detecting credential spear-phishing attacks in corporate networks while achieving a very low number of false positives. [Read More]
A Paris-based malware researcher known as Benkow has discovered more than 700 million records used by the Onliner spambot on a misconfigured server. [Read More]
Many Fortune 500, FTSE 100 and ASX 100 companies still haven’t implemented DMARC to prevent email attacks [Read More]
Symantec released an update for its Messaging Gateway product to address remote code execution and CSRF vulnerabilities [Read More]
In July 2017, global spam rate reached the highest level registered since March 2015, fueled by the emergence of malware families attempting to self-spread via email, Symantec warns. [Read More]
Soon after being found to have worm-like spreading capabilities, the TrickBot banking Trojan has expanded its attack surface to target Outlook and Web browsing data. [Read More]
Microsoft has patched several important vulnerabilities in Outlook, including information disclosure and code execution flaws [Read More]
Britain's parliament shut down external access to e-mail accounts on June 24 following a cyberattack. [Read More]

FEATURES, INSIGHTS // Email Security

rss icon

Tal Be'ery's picture
In this column, Tal analyzes the technical details of the DKIM vulnerability, evaluates possible implications of the exploit, and points to some general lessons.
Alan Wlasuk's picture
Let’s look at what e-mail hacking is really all about and why it could be much more painful than just having to sort through our spouse’s energy drink messages.
Greg Olsen's picture
Transport Layer Security is a means of securing the transmission of email between two MTAs (mail transfer agents). In this column, I’ve highlighted some of the other things that can be done with TLS besides this opportunistic encryption of email.
Greg Olsen's picture
Inbound email to your firm containing important communications related to revenue or customer service could be blocked by your own anti-spam software. How can you prevent against false positives?
Greg Olsen's picture
Interest in Converged Infrastructure solutions has been surging due to the demands of cloud computing. This trend toward Converged Infrastructure has important implications for the email security IT infrastructure.
Greg Olsen's picture
Thinking of migrating mailboxes to a cloud provider? The email backbone is an important architectural tool when dealing with the migration of email mailboxes and maintaining email integrity during the migration process.
Greg Olsen's picture
These best practices for DKIM can help you get more email delivered and lower the likelihood that a message will be categorized as spam.
Greg Olsen's picture
The driver for choosing SaaS as a deployment model is typically cost. But SaaS as a model for CRM can have a downside when it comes to email—the potential for deliverability problems.
Greg Olsen's picture
One of the best ways to optimize security for messaging infrastructure is to leverage the power of something already deployed—the corporate directory.
Greg Olsen's picture
Enterprises today need to not only understand how Data Leak Prevention (DLP) impacts their organization, but also need to be aware of DLP specifically as it relates to email.