E-mail Security

Methods to ensure the safety of electronic mail change constantly. Among the many decisions an organization has to make is whether to perform security on site or detour the messages to a trusted outside party. E-mail security deals with tangible code threats - viruses, Trojans and malware in the e-mails - as well as more subtle threats such as phishing, whaling and other social engineering exploits.


Articles

The Spam Index: A Bird's Eye View of a Shifting Challenge

Brockmann & Company's introduction of The Spam Index nailed down quantitative measures for several things that e-mail users intuitively know: E-mail is useful (82 percent of respondents to the More >

Do Security Vendors Understand the SMB Landscape?

Vendors must understand that the differences between small- and medium-size business (SMBs) and enterprises are qualitative as well as quantitative.   Michelle Dickman, the president of TriGeo, More >

More Articles >

Interviews

Bring Your Own Computer: Intel Calls for Split Personality

Susan Hall talked with Dave Buchholz, Intel IT technology evangelist, about the company's work on what it calls "BYOC [bring your own computer] done right."   Hall: Tell me about what Intel's More >

Spammers Happy to Live in Interesting Times

Carl Weinschenk spoke with Dermot Harnett, principal analyst, Antispam Engineering, Symantec. Symantec's November State of Spam Report said that much of the spam during the past months focused, not More >

Fun Fact: South Dakota Gets the Second Most Spam

Carl Weinschenk spoke with Matt Sergeant, senior anti-spam technologist, MessageLabs. The company released a report last month listing the states that receive the most spam.   Weinschenk: What More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Related IT Downloads

'Liars and Outliers: Enabling the Trust That Society Needs to Thrive' Excerpt 'Liars and Outliers: Enabling the Trust That Society Needs to Thrive' Excerpt

Security technologist Bruce Schneier interconnects concepts from biological and social sciences to describe how society engen...

'The Trustworthy Leader' Excerpt 'The Trustworthy Leader' Excerpt

Co-founder of the Great Place to Work Institute, Amy Lyman describes six characteristics that demonstrate a leader's trustwor...

Ten Ways to Improve the Security of a New Computer Ten Ways to Improve the Security of a New Computer

Keep your information safe from Trojan Horses, viruses and spyware using procedures from the U.S. Computer Emergency Respo...

Security Architecture Roadmap Tool Security Architecture Roadmap Tool

Use this spreadsheet to define a company-wide security strategy....

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date