Security Experts:

Email Security
long dotted

NEWS & INDUSTRY UPDATES

Researchers discover a dozen vulnerabilities in Trend Micro’s Email Encryption Gateway. Most of them have been patched [Read More]
A new business email compromise (BEC) campaign is targeting accounts payable personnel at Fortune 500 companies in an attempt to trick victims into initiating fraudulent wire transactions to attacker-controlled accounts, IBM warns. [Read More]
Maliciously modified copies of popular applications distributed via the MacUpdate site were observed installing crypto-mining malware on the users’ Macs. [Read More]
Kaspersky Lab has updated its Secure Mail Gateway to resolve a series of vulnerabilities that could lead to account takeover, code execution, and privilege escalation. [Read More]
Kaspersky expands SMB offering with a new product designed to provide an extra layer of security for the Exchange Online email service in Office 365 [Read More]
Insurance companies and non-profit organizations are most likely to fall for phishing attacks, according to a study of 6 million users conducted by KnowBe4 [Read More]
Cisco patches high severity vulnerabilities, including privilege escalation and DoS, in email security, NX-OS and collaboration products [Read More]
Russia-linked hackers leaked private correspondence between International Olympic Committee officials in response to Russia being banned from the Pyeongchang 2018 Winter Games [Read More]
DMARC implemented on roughly half of US government domains as a result of a DHS directive, but only 16% quarantine or reject unauthenticated emails [Read More]
The Necurs botnet ended the year sending tens of millions of spam emails daily as part of massive ransomware distribution campaigns. [Read More]

FEATURES, INSIGHTS // Email Security

rss icon

Greg Olsen's picture
These best practices for DKIM can help you get more email delivered and lower the likelihood that a message will be categorized as spam.
Greg Olsen's picture
The driver for choosing SaaS as a deployment model is typically cost. But SaaS as a model for CRM can have a downside when it comes to email—the potential for deliverability problems.
Greg Olsen's picture
One of the best ways to optimize security for messaging infrastructure is to leverage the power of something already deployed—the corporate directory.
Greg Olsen's picture
Enterprises today need to not only understand how Data Leak Prevention (DLP) impacts their organization, but also need to be aware of DLP specifically as it relates to email.
Greg Olsen's picture
DKIM (DomainKeys Identified Mail) was created as an Internet standard method of instilling trust back in email. These best practices around DKIM verification outline what organizations should consider in order to trust email and prevent phishing.
Greg Olsen's picture
When considering policy-based email encryption, there are best practices that an organization can follow for policy-based email encryption.
Greg Olsen's picture
Email is a primary mode of communication in business today and consequently is a mission critical enterprise application. A well-designed corporate email infrastructure should have a security architecture built on the bastion host principle.
Nicholas Filippi's picture
The past two years have seen significant rise in the adoption of cloud computing and Software-as-a-Service (SaaS), however the ever-present concern over security has greatly impacted its growth within email security.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Alex Thurber's picture
Social Media Use Policy - The consumerization of IT is affecting all aspects of the way we work. As Web 2.0 technologies continue to gain popularity amongst employees, IT departments are struggling to understand and manage the challenges.