Best of email security 2013

Email Security Guidelines, Encryption and Appliances

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Is the Storm worm virus still a serious threat?

    Today, attackers continue to have success with the Storm worm and its many variations, using the malware to strengthen their nasty botnets. In this SearchSecurity.com Q&A, expert Ed Skoudis explains why these rather run-of-the-mill attacks are still ... 

  • Security vendor Postini acquired by Google

    Search engine giant Google says it will use its acquisition of security and compliance vendor Postini to expand its hosted applications for businesses. 

  • What are the pros and cons of outsourcing email security services?

    In this SearchSecurity.com Q&A, application security expert Michael Cobb explains whether it's right for your organization to hand off email security services to another provider. 

  • Outbound content filtering requires products and processes

    Expensive and damaging corporate data breaches often happen because sensitive information silently leaks out the door with unknowing employees or malicious hackers. But as Mike Rothman explains, those cracks can be patched with an outbound content fi... 

  • Which email encryption products can be released internationally?

    In this SearchSecurity.com Q&A, application security expert Michael Cobb explains the email encryption products that can be used outside of the United States. 

  • What are the pros and cons of using an email encryption gateway?

    In this SearchSecurity.com Q&A, security management expert Mike Rothman discusses the pros and cons of using an email encryption gateway to prevent data leakage. 

  • Unified communications infrastructure threats and defense strategies

    Unified communications systems promise exciting productivity gains for workers and cost savings for businesses, but many often underestimate the security threats facing them. John Burke outlines the threats facing unified communications and how to de... 

  • passphrase

    A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that is used in creating a digital signature (an encoded signature that proves to someone that it was really you who sent a mes... 

  • ciphertext

    Ciphertext is encrypted text. 

  • cipher block chaining (CBC)

    Cipher block chaining (CBC) is a mode of operation for a block cipher (one in which a sequence of bits are encrypted as a single unit or block with a cipher key applied to the entire block).