Security Experts:

Email Security
long dotted

NEWS & INDUSTRY UPDATES

The Russia-linked threat group known as Fancy Bear has abused Google’s Blogspot service in phishing attacks [Read More]
Vera announces Vera for Mail, a new product that allows organizations to protect and even recall emails [Read More]
30% of the CEOs from some of the world’s largest organizations had their official email address and password compromised in a third-party breach [Read More]
Russia-linked cyberspy group APT28 using NATO’s CyCon cybersecurity conference to trick users into installing malware [Read More]
DHS orders all federal agencies to implement DMARC, but Agari says currently only 9% have fully implemented the system [Read More]
DHS issues binding operational directive requiring all federal agencies to use HTTPS, DMARC and STARTTLS [Read More]
I recent attack reminds us that DMARC can prevent phishing from genuine domains, but cannot prevent phishing from lookalike domains. [Read More]
A vulnerability that that was recently addressed by Microsoft as part of the October 2017 Patch Tuesday could result in Outlook sending emails in cleartext when S/MIME encryption was supposed to be used. [Read More]
A widescale stealthy attack against Office 365 (O365) accounts started in May and is still continuing, with 50 percent of all large Office 365 customers possibly being attacked. [Read More]
The spam rate of overall email dropped slightly over the past couple of months to 55% in September, but remains above the year average, a new Symantec report reveals. [Read More]

FEATURES, INSIGHTS // Email Security

rss icon

Tal Be'ery's picture
In this column, Tal analyzes the technical details of the DKIM vulnerability, evaluates possible implications of the exploit, and points to some general lessons.
Alan Wlasuk's picture
Let’s look at what e-mail hacking is really all about and why it could be much more painful than just having to sort through our spouse’s energy drink messages.
Greg Olsen's picture
Transport Layer Security is a means of securing the transmission of email between two MTAs (mail transfer agents). In this column, I’ve highlighted some of the other things that can be done with TLS besides this opportunistic encryption of email.
Greg Olsen's picture
Inbound email to your firm containing important communications related to revenue or customer service could be blocked by your own anti-spam software. How can you prevent against false positives?
Greg Olsen's picture
Interest in Converged Infrastructure solutions has been surging due to the demands of cloud computing. This trend toward Converged Infrastructure has important implications for the email security IT infrastructure.
Greg Olsen's picture
Thinking of migrating mailboxes to a cloud provider? The email backbone is an important architectural tool when dealing with the migration of email mailboxes and maintaining email integrity during the migration process.
Greg Olsen's picture
These best practices for DKIM can help you get more email delivered and lower the likelihood that a message will be categorized as spam.
Greg Olsen's picture
The driver for choosing SaaS as a deployment model is typically cost. But SaaS as a model for CRM can have a downside when it comes to email—the potential for deliverability problems.
Greg Olsen's picture
One of the best ways to optimize security for messaging infrastructure is to leverage the power of something already deployed—the corporate directory.
Greg Olsen's picture
Enterprises today need to not only understand how Data Leak Prevention (DLP) impacts their organization, but also need to be aware of DLP specifically as it relates to email.