Best of email security 2013

Email Security Guidelines, Encryption and Appliances

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Securing e-mail exchanges

    In this Ask the Expert Q&A, Michael Cobb examines how using S/MIME and various encryption methods can help solve your confidentiality, authenticity, non-repudiation, unsecured backup and other e-mail issues. 

  • MD5 vs. RC4

    In this Ask the Expert Q&A our application security expert compares the MD5 encryption algorithm against its competitor RC4 and examines the security features of each. 

  • Authentication Header vs. IKE

    In this Ask the Expert Q&A, Joel Dubin discusses how and when the Authentication Header encryption protocol is used. 

  • The effects of spyware

    In this Ask the Expert Q&A, Michael Cobb discusses various methods spyware uses to compromise a PC. He also suggests tools and tactics to use to rid your PC of an infection. 

  • How hybrid cryptosystems secure e-mail exchange

    In this Ask the Expert Q&A, our application security expert discusses how hybrid cryptosystems are used to secure an e-mail exchange. 

  • Cracking smaller messages

    Learn whether or not a smaller message is easier to crack and how encryption makes plaintext plausible. Also learn how to encrypt a message and why you should consider using a smaller key. 

  • Encryption detection

    In the Ask the Expert Q&A, Michael Cobb, our application security expert discusses if it is possible to detect encryption. He also takes a closer look at steganography, explains what it is and how it is used to secure e-mail communications. 

  • Digital certificates and webmail

    In this Ask the expert Q&A, our application security expert analyzes whether or not you can use digital IDs and certificates with webmail. He also discusses how and where to secure these devices to ensure your e-mail system is secure. 

  • How to configure an FTP server with SSL

    In this expert response, security expert Michael Cobb explains how to securely configure an FTP server with Secure Socket Layering (SSL). 

  • Securing public key transport

    Learn how a client uses the HTTPS protocol to request a secure Web page and initiate a secure Web site session.