Security Experts:

Email Security
long dotted

NEWS & INDUSTRY UPDATES

California startup Bolster banks early-stage venture capital funding to build a fraud prevention platform for businesses. [Read More]
A survey found that 91% of cybersecurity and IT leaders have difficulty in selecting cybersecurity vendors due to unclear marketing about their specific offerings. [Read More]
European venture capital and private equity firm Smartfin has acquired Hex-Rays, the company behind the widely deployed IDA Pro software disassembler. [Read More]
Zimbra has rushed out patches to provide cover for a code execution flaw that has already been exploited to plant malware on target machines. [Read More]
Zoom has rolled out a high-priority patch for macOS users with a warning that hackers could abuse the software flaw to connect to and control Zoom Apps. [Read More]
WithSecure researcher Harry Sintonen has released an advisory on issues with Microsoft Office 365 Message Encryption (OME). [Read More]
More than 800 corporate users have been infected with the QBot information stealer over the past couple of weeks. [Read More]
Microsoft releases patches to address more than 90 security defects affecting products in the Windows ecosystem but there's no fix yet for a pair of exploited Exchange Server bugs. [Read More]
Adobe ships security patches for 29 documented vulnerabilities across multiple enterprise-facing products. [Read More]
The car manufacturer has admitted that a GitHub repository inadvertently made public potentially led to source code exposure and potential customer email addresses leak. [Read More]

FEATURES, INSIGHTS // Email Security

rss icon

Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Jack Danahy's picture
To mitigate the risk of attacks, IT teams should disable unused tools and components, while deploying endpoint protection that doesn’t rely solely on file scanning or whitelisting.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Erin O’Malley's picture
Conventional email security solutions may defend against spam, viruses, and malware, but they don’t defend against ignorance or egregious stupidity.
Bill Sweeney's picture
As data moves online, social engineering techniques have become far more personalized, technologically advanced and ultimately successful.
Travis Greene's picture
Yahoo's “Account Key” uses push notifications to their Yahoo Mail app on mobile devices. Will this securely replace passwords and two-factor authentication?
Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.
Marc Solomon's picture
Today’s email-based attacks don’t occur at a single point in time and use multiple methods to evade detection. To bolster protection, organizations may turn to a set of disparate products that don’t – and can’t – work together.
Marc Solomon's picture
Recent high-profile security breaches at major retailers stem from the fact that in-store networks and their components are evolving and spawning a range of attack vectors.