E-mail Security

Methods to ensure the safety of electronic mail change constantly. Among the many decisions an organization has to make is whether to perform security on site or detour the messages to a trusted outside party. E-mail security deals with tangible code threats - viruses, Trojans and malware in the e-mails - as well as more subtle threats such as phishing, whaling and other social engineering exploits.


The Spam Index: A Bird's Eye View of a Shifting Challenge

Brockmann & Company's introduction of The Spam Index nailed down quantitative measures for several things that e-mail users intuitively know: E-mail is useful (82 percent of respondents to the More >

Do Security Vendors Understand the SMB Landscape?

Vendors must understand that the differences between small- and medium-size business (SMBs) and enterprises are qualitative as well as quantitative.   Michelle Dickman, the president of TriGeo, More >

More Articles >


Bring Your Own Computer: Intel Calls for Split Personality

Susan Hall talked with Dave Buchholz, Intel IT technology evangelist, about the company's work on what it calls "BYOC [bring your own computer] done right."   Hall: Tell me about what Intel's More >

Spammers Happy to Live in Interesting Times

Carl Weinschenk spoke with Dermot Harnett, principal analyst, Antispam Engineering, Symantec. Symantec's November State of Spam Report said that much of the spam during the past months focused, not More >

Fun Fact: South Dakota Gets the Second Most Spam

Carl Weinschenk spoke with Matt Sergeant, senior anti-spam technologist, MessageLabs. The company released a report last month listing the states that receive the most spam.   Weinschenk: What More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making


SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice

2014 Holiday Shopping Trends Revealed

Security Staffing

The holiday season is an important one for retailers, but as shoppers become more savvy, every detail retailers can glean about shopper behavior can contribute to the bottom line.

 More >

Twitter Rethinks Authentication and Access

Women ‘Need to Be Willing to Try,’ Female Tech CEO Says

Canonical Upgrades Ubuntu Linux Distributions

SAP Collapses HANA Infrastructure Stack


Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

'Liars and Outliers: Enabling the Trust That Society Needs to Thrive' Excerpt 'Liars and Outliers: Enabling the Trust That Society Needs to Thrive' Excerpt

Security technologist Bruce Schneier interconnects concepts from biological and social sciences to describe how society engen...

'The Trustworthy Leader' Excerpt 'The Trustworthy Leader' Excerpt

Co-founder of the Great Place to Work Institute, Amy Lyman describes six characteristics that demonstrate a leader's trustwor...

Ten Ways to Improve the Security of a New Computer Ten Ways to Improve the Security of a New Computer

Keep your information safe from Trojan Horses, viruses and spyware using procedures from the U.S. Computer Emergency Respo...

Security Architecture Roadmap Tool Security Architecture Roadmap Tool

Use this spreadsheet to define a company-wide security strategy....

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.