Security Experts:

Email Security
long dotted

NEWS & INDUSTRY UPDATES

Chipmakers Intel and AMD release patches for multiple vulnerabilities in multiple products, including a series of high severity issues in software drivers. [Read More]
AT&T Alien Labs researchers flag new Golang-based malware threat that could potentially infect millions of routers and Internet of Things (IoT) devices. [Read More]
Zoom ships multiple security bulletins calling special attention to a pair of “high-risk” bugs affecting its on-prem meeting connector software and the popular Keybase Client. [Read More]
U.S. Vice President Kamala Harris on Wednesday announced support for the Paris Call for Trust and Security in Cyberspace. [Read More]
Palo Alto Networks is calling urgent attention to a critical-severity vulnerability in its GlobalProtect portal and gateway interfaces. [Read More]
An authenticated attacker could exploit the flaw to trigger the restart of the WordPress installation process and create an administrator account. [Read More]
Researchers warn that the malware has extensive spyware capabilities, including data theft, GPS monitoring, and audio and video recording. [Read More]
Microsoft said the two under-attack vulnerabilities exist in Microsoft Exchange Server and Microsoft Excel, two widely deployed products in the Windows ecosystem. [Read More]
Adobe patches a security flaw in the RoboHelp Server product, warning that corporate environments are exposed to arbitrary code execution attacks. [Read More]
Enterprise information management solutions provider OpenText acquires email security firm Zix for $860 million. [Read More]

FEATURES, INSIGHTS // Email Security

rss icon

Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Jon-Louis Heimerl's picture
Was the Mayan Apocalypse was a myth? Since I am a security geek, I just happen to talk about security a lot. What are some security myths I have heard in my conversations with some very bright people?
Tal Be'ery's picture
In this column, Tal analyzes the technical details of the DKIM vulnerability, evaluates possible implications of the exploit, and points to some general lessons.
Alan Wlasuk's picture
Let’s look at what e-mail hacking is really all about and why it could be much more painful than just having to sort through our spouse’s energy drink messages.
Greg Olsen's picture
Transport Layer Security is a means of securing the transmission of email between two MTAs (mail transfer agents). In this column, I’ve highlighted some of the other things that can be done with TLS besides this opportunistic encryption of email.
Greg Olsen's picture
Inbound email to your firm containing important communications related to revenue or customer service could be blocked by your own anti-spam software. How can you prevent against false positives?
Greg Olsen's picture
Interest in Converged Infrastructure solutions has been surging due to the demands of cloud computing. This trend toward Converged Infrastructure has important implications for the email security IT infrastructure.
Greg Olsen's picture
Thinking of migrating mailboxes to a cloud provider? The email backbone is an important architectural tool when dealing with the migration of email mailboxes and maintaining email integrity during the migration process.
Greg Olsen's picture
These best practices for DKIM can help you get more email delivered and lower the likelihood that a message will be categorized as spam.
Greg Olsen's picture
The driver for choosing SaaS as a deployment model is typically cost. But SaaS as a model for CRM can have a downside when it comes to email—the potential for deliverability problems.