Security Experts:

Email Security
long dotted

NEWS & INDUSTRY UPDATES

EFAIL: researchers say they’ve found ways to steal plain text from emails encrypted with OpenPGP and S/MIME, but some believe the claims are overblown [Read More]
Researchers discover that cybercriminals have been using a new method to bypass the Safe Links security feature in Office 365. Microsoft is investigating [Read More]
Researchers analyze North Korea’s SiliVaccine antivirus and discover that it uses a 10-year-old scan engine from Japanese company Trend Micro [Read More]
Gold Galleon: Nigerian hackers target global maritime shipping businesses and their customers in BEC attacks [Read More]
FireEye announces new solutions, capabilities, pricing and packaging models, and a partnership with Oracle [Read More]
Vast majority of the exhibitors at the RSA Conference have not implemented DMARC on their primary domains, opening the door to fraudulent and fake emails [Read More]
Trend Micro unveils Writing Style DNA, an AI-powered capability that uses writing style analysis to detect business email compromise (BEC) attacks [Read More]
Cisco has launched new email security services to protect users from email attacks, as well as new capabilities to protect devices from ransomware, cryptomining, and fileless malware. [Read More]
Cloudflare launches Spectrum, a new service designed to extend the company’s DDoS and other protections to gaming, remote access, email and other services [Read More]
Ransomware is the most prevalent type of malware and it increasingly targets business-critical systems, according to Verizon’s 2018 Data Breach Investigations Report (DBIR) [Read More]

FEATURES, INSIGHTS // Email Security

rss icon

Greg Olsen's picture
Thinking of migrating mailboxes to a cloud provider? The email backbone is an important architectural tool when dealing with the migration of email mailboxes and maintaining email integrity during the migration process.
Greg Olsen's picture
These best practices for DKIM can help you get more email delivered and lower the likelihood that a message will be categorized as spam.
Greg Olsen's picture
The driver for choosing SaaS as a deployment model is typically cost. But SaaS as a model for CRM can have a downside when it comes to email—the potential for deliverability problems.
Greg Olsen's picture
One of the best ways to optimize security for messaging infrastructure is to leverage the power of something already deployed—the corporate directory.
Greg Olsen's picture
Enterprises today need to not only understand how Data Leak Prevention (DLP) impacts their organization, but also need to be aware of DLP specifically as it relates to email.
Greg Olsen's picture
DKIM (DomainKeys Identified Mail) was created as an Internet standard method of instilling trust back in email. These best practices around DKIM verification outline what organizations should consider in order to trust email and prevent phishing.
Greg Olsen's picture
When considering policy-based email encryption, there are best practices that an organization can follow for policy-based email encryption.
Greg Olsen's picture
Email is a primary mode of communication in business today and consequently is a mission critical enterprise application. A well-designed corporate email infrastructure should have a security architecture built on the bastion host principle.
Nicholas Filippi's picture
The past two years have seen significant rise in the adoption of cloud computing and Software-as-a-Service (SaaS), however the ever-present concern over security has greatly impacted its growth within email security.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!