Security Experts:

Email Security
long dotted

NEWS & INDUSTRY UPDATES

Cybersecurity start-up GreatHorn has raised $6.3 million through a Series A funding round led by Techstars Venture Capital Fund and .406 Ventures. [Read More]
Palestinian law enforcement agencies and other targets within Palestine were targeted in a spear phishing campaign delivering malware to remotely control infected systems, Talos researchers reveal. [Read More]
Cybercriminals have found a new method to deliver malware - it relies on PowerPoint files and mouseover events [Read More]
Google today announced a series of improvements to Gmail’s security aimed at making the service better at protecting business data. [Read More]
Spear-phishing attacks are increasingly focused - a study by IRONSCALES found that most attacks only targeted 10 inboxes or less [Read More]
Hackers breached DocuSign systems and stole email addresses, which they used in a spam campaign designed to deliver malware [Read More]
A phishing scam that tricked people with what appeared to be Google Docs links was doused by the internet giant after spreading wildly on May 3, 2017. [Read More]
Researchers claim to have found serious flaws in the nomx email security device. Vendor disputes findings [Read More]
The Simple Network Management Protocol (SNMP) embedded in some Internet connected devices allows an attacker to bypass authentication by simply sending random values in specific requests. [Read More]
Tracking pixel image files can track user behavior have started to emerge in phishing campaigns, where hackers use them to gather information on their targets. [Read More]

FEATURES, INSIGHTS // Email Security

rss icon

Greg Olsen's picture
DKIM (DomainKeys Identified Mail) was created as an Internet standard method of instilling trust back in email. These best practices around DKIM verification outline what organizations should consider in order to trust email and prevent phishing.
Greg Olsen's picture
When considering policy-based email encryption, there are best practices that an organization can follow for policy-based email encryption.
Greg Olsen's picture
Email is a primary mode of communication in business today and consequently is a mission critical enterprise application. A well-designed corporate email infrastructure should have a security architecture built on the bastion host principle.
Nicholas Filippi's picture
The past two years have seen significant rise in the adoption of cloud computing and Software-as-a-Service (SaaS), however the ever-present concern over security has greatly impacted its growth within email security.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Alex Thurber's picture
Social Media Use Policy - The consumerization of IT is affecting all aspects of the way we work. As Web 2.0 technologies continue to gain popularity amongst employees, IT departments are struggling to understand and manage the challenges.