Best of email security 2013

Email Security Guidelines, Encryption and Appliances

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How hybrid cryptosystems secure e-mail exchange

    In this Ask the Expert Q&A, our application security expert discusses how hybrid cryptosystems are used to secure an e-mail exchange. 

  • Quiz: What's your infosec IQ?

    Test your information security IQ with this short quiz. 

  • Sizing up e-mail appliances, part 3

    Information Security magazine tests four e-mail appliances designed to clear the way for safe messaging. Here's how they measured up. 

  • Sizing up e-mail appliances, part 2

    "Information Security" magazine tests four e-mail appliances designed to clear the way for safe messaging. Here's how they measured up. 

  • Sizing up e-mail appliances

    Information Security magazine tests four e-mail appliances designed to clear the way for safe messaging. Here's how they measured up. 

  • elliptical curve cryptography (ECC)

    Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. 

  • deniable encryption

    Deniable encryption is a type of cryptography that allows an encrypted text to be decrypted in two or more ways, depending on which decryption key is used. 

  • cryptographic checksum

    A cryptographic checksum is a mathematical value (called a checksum) that is assigned to a file and used to "test" the file at a later date to verify that the data contained in the file has not been maliciously changed. 

  • MPPE (Microsoft Point-to-Point Encryption)

    MPPE (Microsoft Point-to-Point Encryption) is a method of encrypting data transferred across Point-to-Point Protocol (PPP)-based dial-up connections or Point-to-Point Tunneling Protocol (PPTP) virtual private network (VPN) connections. 

  • cryptoperiod (key lifetime or a validity period)

    A cryptoperiod (sometimes called a key lifetime or a validity period) is a specific time span during which a cryptographic key setting remains in effect.