Best of email security 2013

Email Security Guidelines, Encryption and Appliances

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Is there a way to identify a spoofed user ID?

    In this application security Ask the Expert Q&A, Michael Cobb explains how an organization can identify the employee who has used a spoofed user ID to intercept email exchanges. 

  • Authentication controls for systems using e-signatures

    In this Ask the Expert Q&A, Joel Dubin, our identity and access management expert examines various authentication controls for systems using e-signatures, and weighs the pros and cons of each. 

  • Secure email exchange: Establishing security associations

    What happens if a security association can not be established during an email exchange? Michael Cobb has the answer. 

  • Enterprise-level spam filters

    Learn whether there a corporate spam filter that allows individual users to add specific e-mail addresses to block or whitelist as needed, in this application security Ask the Expert Q&A. 

  • How e-mail message components are used

    Learn what happens when someone's e-mail address differs from the certificate e-mail field value, in this application security Ask the Expert Q&A. 

  • PKI system validation processes

    Learn how an X.509 DN e-mail field is validated when you reply to a digitally signed message, and learn what to do when you want to encrypt it, in the application security Ask the Expert Q&A. 

  • How to prevent poor e-mail practices

    In this Ask the Expert Q&A, our application security expert examines why organizations should implement and enforce an enterprise-wide e-mail encryption security policy. 

  • How RSA keys differ from DH/DSS keys

    In this Ask the Expert Q&A, Michael Cobb, our application security expert explains how RSA and DH/DSS differ, examines the strengths and weaknesses of each, and, explains how to use the compression library Zlib. 

  • Best practices for password protection

    Learn what a keyring is -- how it works in conjuction with passphrases to keep sensitive and personal messages secure. Also learn what practices help keep passwords protected from hackers and crackers. 

  • How IPsec and SSL/TLS use symmetric and asymmetric encryption

    In this Ask the Expert Q&A, our identity and access management expert explains how IPsec and SSL/TLS use these two authentication methods to establish secure Web sessions.