New & Notable
Email Security Guidelines, Encryption and Appliances News
November 26, 2012
Mixing business and personal email accounts has serious drawbacks, as well as consequences on IT teams managing data integrity.
July 30, 2012
Researcher Peter Hannay's man-in-the-middle attack exploited an SSL handing flaw to remotely wipe Android and iOS mobile devices via Exchange server.
February 28, 2012
RSA’s Arthur Coviello urged security pros to break down silos and intelligence-driven security programs, or face a tough year.
January 25, 2012
Newly appointed Epsilon CISO Chris Ray said he will take a step back and get a better understanding of the business before trying to address gaps.
Email Security Guidelines, Encryption and Appliances Get Started
Bring yourself up to speed with our introductory content
Pretty Good Privacy or PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files. Continue Reading
The Advanced Encryption Standard or AES is a symmetric block cipher used by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data. Continue Reading
The Data Encryption Standard (DES) is an outdated symmetric-key method of data encryption. Continue Reading
Evaluate Email Security Guidelines, Encryption and Appliances Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Readers pick the top email messaging security products of 2014. Continue Reading
Cloud-based email security is a top SaaS initiative for many firms, but is it really better than traditional email security? Ed Moyle offers a primer. Continue Reading
Expert Michael Cobb discusses how to identify the data egress points in enterprise databases to prevent malicious data exfiltration. Continue Reading
Manage Email Security Guidelines, Encryption and Appliances
Learn to apply best practices and optimize your operations.
The Canadian anti-spam legislation applies to many enterprises. Expert Mike Chapple explains what the effects of CASL are for businesses. Continue Reading
Plaintext passwords are risky business. Michael Cobb discusses what Google says about the Chrome password vulnerability and potential exploits. Continue Reading
Readers vote on their top email security products in 2013: Antispam, antiphishing, email antivirus, spyware, antimalware filtering through software and appliances. Continue Reading
Problem Solve Email Security Guidelines, Encryption and Appliances Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Nick Lewis determines whether the DomainKeys Identified Mail protocol can still be safely relied upon for email authentication. Continue Reading
DMARC aids the DKIM and SPF protocols that help keep spam out and let legitimate emails in. David Jacobs explains how. Continue Reading
Randall Gamby explains the important particulars involved with setting up and securely supervising an enterprise Exchange Server administration policy. Continue Reading