Best of email security 2013

Email Security Guidelines, Encryption and Appliances

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Enterprise-level spam filters

    Learn whether there a corporate spam filter that allows individual users to add specific e-mail addresses to block or whitelist as needed, in this application security Ask the Expert Q&A. 

  • How e-mail message components are used

    Learn what happens when someone's e-mail address differs from the certificate e-mail field value, in this application security Ask the Expert Q&A. 

  • PKI system validation processes

    Learn how an X.509 DN e-mail field is validated when you reply to a digitally signed message, and learn what to do when you want to encrypt it, in the application security Ask the Expert Q&A. 

  • 2006 Products of the Year: E-mail security

    Information Security magazine and SearchSecurity.com readers selected the top three e-mail security products of 2006. 

  • Secure data transmission methods

    The main purpose of this tip is to explore secure data transmission options that are available to help meet regulatory and legal requirements. 

  • End of spam, phishing threats not far off

    Viruses, spam and phishing aren't going away overnight. But for 2006, one research firm says a new set of messaging security threats will take center stage. 

  • block cipher

    A block cipher is a method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to a block of data (for example, 64 contiguous bits) at once as a group rather than to one bit at a time. 

  • Security Bytes: Flaws found in BlackBerry Server

    In other news, Social Security numbers of H&R Block customers are reportedly exposed and multiple vulnerabilities are found in the Linux kernel. 

  • How to prevent poor e-mail practices

    In this Ask the Expert Q&A, our application security expert examines why organizations should implement and enforce an enterprise-wide e-mail encryption security policy. 

  • How RSA keys differ from DH/DSS keys

    In this Ask the Expert Q&A, Michael Cobb, our application security expert explains how RSA and DH/DSS differ, examines the strengths and weaknesses of each, and, explains how to use the compression library Zlib.