Best of email security 2013

Email Security Guidelines, Encryption and Appliances

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Secure Computing to acquire CipherTrust

    Secure Computing is buying messaging security vendor CipherTrust for nearly $274 million. The move is intended to strengthen Secure Computing's unified threat management program. 

  • Thwarting spam from the inside and the outside

    After discovering that stopping email threats takes more than a layer of spam filtering and two layers of virus protection, one law firm added hosted defense to the mix. 

  • Data Encryption Standard (DES)

    Data Encryption Standard (DES) is a widely-used method of data encryption using a private (secret) key that was judged so difficult to break by the U.S. government that it was restricted for exportation to other countries. 

  • Information Security Quizzes

    Test your knowledge of everything security, from network security to regulatory compliance, with our collection of quizzes. 

  • Use SHA to encrypt sensitive data

    Complying with the PCI Data Security Standard is now on the forefront of many security practitioner's minds. Learn how using the Secure Hashing Algorithm can help you encrypt sensitive data and help you meet the PCI Data Security Standard requirement... 

  • How to perform an email scan to protect against viruses

    Scanning your email for viruses before it reaches your Exchange Server can prevent the spread of viruses. In this applicaton security Ask the Expert Q&A, SearchSecurity's resident expert explains how to perform and effective email scan. 

  • OpenPGP and email: Email from beyond your Web of trust

    Examine how OpenPGP works and how to confirm that the person you are communicating with over email is not legitimate, in this Chapter 8 excerpt from "PGP & GPG: Email for the Practical Paranoid," by Michael W. Lucas. 

  • Out-of-office messages: A security hazard?

    Automatically generated out-of-office messages, like the kind created by Microsoft Outlook, have come under scrutiny as a possible security hazard for a number of reasons. Should organizations prohibit the use of out-of-office messages? Serdar Yegula... 

  • Does email archiving mean keep everything?

    An expert at the Storage Decisions conference weighs in on whether it makes sense to keep data forever or if reducing data also reduces risk. Plus dirt on conniving lawyers and dodgy tape practices. 

  • Messaging security is the name of the game at Interop

    Messaging security was a hot Interop topic, rivaled only by every other aspect of security. Vendors rolled out wares to protect messaging systems and other points on the network.