Security Experts:

Email Security
long dotted

NEWS & INDUSTRY UPDATES

More than half of U.S. government agencies have properly implemented the DMARC email security standard in response to a binding operational directive from the DHS [Read More]
Email security firm GreatHorn wanted to examine the state of email security today, nearly fifty years after email was first developed. [Read More]
Symantec announces availability of Email Threat Isolation, a new solution designed to protect enterprises against phishing, account hijacking, and other attacks [Read More]
The losses and potential losses reported as a result of business email compromise (BEC) and email account compromise (EAC) scams exceed over $12 billion globally, says the FBI [Read More]
London, UK-based email archiving and security firm Mimecast has acquired Bethesda, Md-based security training company Ataata. Financial terms of the acquisition have not been disclosed. [Read More]
ProtonMail hit by significant DDoS attack apparently carried out by a group that claims to have ties to Russia [Read More]
The Electronic Frontier Foundation (EFF) announced STARTTLS Everywhere, a new project aimed at improving the security of email delivery. [Read More]
The Necurs botnet has started using Internet Query (IQY) files in recent waves of spam attacks, in an attempt to thwart security protections. [Read More]
Cybercriminals use a technique dubbed by researchers ZeroFont to bypass Office 365 phishing protections [Read More]
UK-based start-up Tessian, which uses machine learning artificial intelligence to prevent sensitive data leakage via email, has raised $13 million in a Series A funding. [Read More]

FEATURES, INSIGHTS // Email Security

rss icon

Marc Solomon's picture
Today’s email-based attacks don’t occur at a single point in time and use multiple methods to evade detection. To bolster protection, organizations may turn to a set of disparate products that don’t – and can’t – work together.
Marc Solomon's picture
Recent high-profile security breaches at major retailers stem from the fact that in-store networks and their components are evolving and spawning a range of attack vectors.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Jon-Louis Heimerl's picture
Was the Mayan Apocalypse was a myth? Since I am a security geek, I just happen to talk about security a lot. What are some security myths I have heard in my conversations with some very bright people?
Tal Be'ery's picture
In this column, Tal analyzes the technical details of the DKIM vulnerability, evaluates possible implications of the exploit, and points to some general lessons.
Alan Wlasuk's picture
Let’s look at what e-mail hacking is really all about and why it could be much more painful than just having to sort through our spouse’s energy drink messages.
Greg Olsen's picture
Transport Layer Security is a means of securing the transmission of email between two MTAs (mail transfer agents). In this column, I’ve highlighted some of the other things that can be done with TLS besides this opportunistic encryption of email.
Greg Olsen's picture
Inbound email to your firm containing important communications related to revenue or customer service could be blocked by your own anti-spam software. How can you prevent against false positives?
Greg Olsen's picture
Interest in Converged Infrastructure solutions has been surging due to the demands of cloud computing. This trend toward Converged Infrastructure has important implications for the email security IT infrastructure.