Security Experts:

Email Security
long dotted

NEWS & INDUSTRY UPDATES

Mailsploit vulnerabilities allow email spoofing and code injection attacks against over 30 email apps [Read More]
Critical remote code execution vulnerability found in Exim, a popular mail transfer agent (MTA) running on hundreds of thousands of mail servers [Read More]
Secure email services provider ProtonMail introduces new encrypted contacts manager to help users protect their address book [Read More]
Cybersecurity firm Proofpoint on Tuesday announced that it has agreed to acquire messaging security firm Cloudmark for $110 million in cash. [Read More]
The Russia-linked threat group known as Fancy Bear has abused Google’s Blogspot service in phishing attacks [Read More]
Vera announces Vera for Mail, a new product that allows organizations to protect and even recall emails [Read More]
30% of the CEOs from some of the world’s largest organizations had their official email address and password compromised in a third-party breach [Read More]
Russia-linked cyberspy group APT28 using NATO’s CyCon cybersecurity conference to trick users into installing malware [Read More]
DHS orders all federal agencies to implement DMARC, but Agari says currently only 9% have fully implemented the system [Read More]
DHS issues binding operational directive requiring all federal agencies to use HTTPS, DMARC and STARTTLS [Read More]

FEATURES, INSIGHTS // Email Security

rss icon

Greg Olsen's picture
The driver for choosing SaaS as a deployment model is typically cost. But SaaS as a model for CRM can have a downside when it comes to email—the potential for deliverability problems.
Greg Olsen's picture
One of the best ways to optimize security for messaging infrastructure is to leverage the power of something already deployed—the corporate directory.
Greg Olsen's picture
Enterprises today need to not only understand how Data Leak Prevention (DLP) impacts their organization, but also need to be aware of DLP specifically as it relates to email.
Greg Olsen's picture
DKIM (DomainKeys Identified Mail) was created as an Internet standard method of instilling trust back in email. These best practices around DKIM verification outline what organizations should consider in order to trust email and prevent phishing.
Greg Olsen's picture
When considering policy-based email encryption, there are best practices that an organization can follow for policy-based email encryption.
Greg Olsen's picture
Email is a primary mode of communication in business today and consequently is a mission critical enterprise application. A well-designed corporate email infrastructure should have a security architecture built on the bastion host principle.
Nicholas Filippi's picture
The past two years have seen significant rise in the adoption of cloud computing and Software-as-a-Service (SaaS), however the ever-present concern over security has greatly impacted its growth within email security.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Alex Thurber's picture
Social Media Use Policy - The consumerization of IT is affecting all aspects of the way we work. As Web 2.0 technologies continue to gain popularity amongst employees, IT departments are struggling to understand and manage the challenges.