Ray Everett-Church - ALL ARTICLES - PAGE 1

McColo and the Difficulty of Fighting Spam

November 18, 2008
In a world full of spamming, phishing and other fraudulent behavior, even the most battle-tested spam investigators are hard-pressed to assess who’s to blame and who’s been framed.
READ MORE

How To Get Your Email Past Clients' Spam Filter

September 17, 2008
Achieving “deliverability,” otherwise known as getting email delivered to a user’s inbox in a timely and fully-functional fashion, is both an art and a science.
READ MORE

Organizing IT Chaos through Email Authentication

March 25, 2008
Undertaking the sometimes daunting task of deploying authentication provides a great excuse for IT managers to begin tackling the sprawling beast that is today's modern corporate email infrastructure.
READ MORE

Businesses Reach the Tipping Point in Email Authentication

February 25, 2008
A new survey shows that more than half of businesses now use an email authentication scheme. Those that don’t are starting to lose a competitive advantage.
READ MORE

You've Got Spam: The New Field of Reputation Management

December 21, 2007
Certain email snafus can be fatal to the effectiveness of a company's entire email strategy and can tarnish the goodwill associated with their good name.
READ MORE

DKIM-a-Palooza

November 27, 2007
If you manage email systems and aren’t familiar with DKIM, you may still have time to learn about it. But you don’t have the luxury of ignoring it.
READ MORE

Fear and Loathing in an Airport Check-In Line

October 19, 2007
A new security service promises a shorter airport check-in, but an expert user isn’t thrilled by it.
READ MORE

Microsoft's New Patent: The Dark Side of SaaS

September 18, 2007
A new patent for notifying people when a privacy policy has changed suggests some dark possibilities for the future of software-as-a-service.
READ MORE

The Las Vegas Counterfeiting Story: Is Your Privacy Worth More Than a Poker Chip?

August 29, 2007
What happens in Las Vegas stays in Las Vegas, unless it spotlights how companies are tearing down the last remaining personal data protections.
READ MORE

Spam: You've Come a Long Way, Baby

July 26, 2007
The author reports on the recent FTC "Spam Summit," and contrasts it with a similar event he attended ten years ago.
READ MORE

Google's Race to the Bottom

June 20, 2007
A new report claims Google has an “entrenched hostility to privacy.” Does the search giant need a Chief Privacy Officer?
READ MORE

Email Administrator Best Practices

May 21, 2007
New recommendations, and some that fall into the “should have been done correctly in the first place” category.
READ MORE

Taxes, The Internet, and the Government: Be Afraid

April 17, 2007
As the federal government moves more of its tax filing and preparation process online, several dangers loom, argues a security expert.
READ MORE

How Big A Crime is Invasion of Privacy?

March 21, 2007
A security expert argues that in the wake of the HP case, we must face a shocking truth: sometimes invasion of privacy is merely a petty crime.
READ MORE

Vista's Faux Security

February 21, 2007
An endless series of meaningless choices does not equal privacy, argues a security expert. Nor will they equal security for Vista.
READ MORE

Medical Identity Theft: Enough to Make You Sick

January 15, 2007
Ever wonder what mistakes are in your medical records? Even worse: fraudsters are using these mistaken records to con the healthcare system.
READ MORE

Privacy Rules: Business vs. Consumers

December 18, 2006
American businesses lobbying for lax security regulations should look at Europe’s example to see the economic value of tighter rules.
READ MORE

Spam Bust: The Lessons of Yesmail

November 20, 2006
Is your company violating spam laws like Yesmail did? Even an unwitting violation can result in a fine.
READ MORE

The Dangers of Web 2.0

October 16, 2006
In the rush to ride the Web 2.0 wave, too many companies are ignoring the fundamentals of security and privacy.
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|