Intrusion Prevention Systems
Network Access Control
Endpoint Detection and Response
Data Loss Prevention
Enterprise Mobility Management
Mobile Device Management
Threat Intelligence and Analytics
Identity and Access Management
Cloud Security Best Practices
Ray Everett-church - Article Archives - Page 1
McColo and the Difficulty of Fighting Spam
November 18, 2008
In a world full of spamming, phishing and other fraudulent behavior, even the most battle-tested spam investigators are hard-pressed to assess whos to blame and whos been framed.
How To Get Your Email Past Clients' Spam Filter
September 17, 2008
Achieving deliverability, otherwise known as getting email delivered to a users inbox in a timely and fully-functional fashion, is both an art and a science.
Organizing IT Chaos through Email Authentication
March 25, 2008
Undertaking the sometimes daunting task of deploying authentication provides a great excuse for IT managers to begin tackling the sprawling beast that is today's modern corporate email infrastructure.
Businesses Reach the Tipping Point in Email Authentication
February 25, 2008
A new survey shows that more than half of businesses now use an email authentication scheme. Those that dont are starting to lose a competitive advantage.
You've Got Spam: The New Field of Reputation Management
December 21, 2007
Certain email snafus can be fatal to the effectiveness of a company's entire email strategy and can tarnish the goodwill associated with their good name.
November 27, 2007
If you manage email systems and arent familiar with DKIM, you may still have time to learn about it. But you dont have the luxury of ignoring it.
Fear and Loathing in an Airport Check-In Line
October 19, 2007
A new security service promises a shorter airport check-in, but an expert user isnt thrilled by it.
Microsoft's New Patent: The Dark Side of SaaS
September 18, 2007
The Las Vegas Counterfeiting Story: Is Your Privacy Worth More Than a Poker Chip?
August 29, 2007
What happens in Las Vegas stays in Las Vegas, unless it spotlights how companies are tearing down the last remaining personal data protections.
Spam: You've Come a Long Way, Baby
July 26, 2007
The author reports on the recent FTC "Spam Summit," and contrasts it with a similar event he attended ten years ago.
Google's Race to the Bottom
June 20, 2007
A new report claims Google has an entrenched hostility to privacy. Does the search giant need a Chief Privacy Officer?
Email Administrator Best Practices
May 21, 2007
New recommendations, and some that fall into the “should have been done correctly in the first place” category.
Taxes, The Internet, and the Government: Be Afraid
April 17, 2007
As the federal government moves more of its tax filing and preparation process online, several dangers loom, argues a security expert.
How Big A Crime is Invasion of Privacy?
March 21, 2007
A security expert argues that in the wake of the HP case, we must face a shocking truth: sometimes invasion of privacy is merely a petty crime.
Vista's Faux Security
February 21, 2007
An endless series of meaningless choices does not equal privacy, argues a security expert. Nor will they equal security for Vista.
Medical Identity Theft: Enough to Make You Sick
January 15, 2007
Ever wonder what mistakes are in your medical records? Even worse: fraudsters are using these mistaken records to con the healthcare system.
Privacy Rules: Business vs. Consumers
December 18, 2006
American businesses lobbying for lax security regulations should look at Europes example to see the economic value of tighter rules.
Spam Bust: The Lessons of Yesmail
November 20, 2006
Is your company violating spam laws like Yesmail did? Even an unwitting violation can result in a fine.
The Dangers of Web 2.0
October 16, 2006
In the rush to ride the Web 2.0 wave, too many companies are ignoring the fundamentals of security and privacy.
SECURITY DAILY NEWSLETTER
GET SECURITY NEWS IN YOUR INBOX EVERY DAY
TERMS OF SERVICE
LICENSING AND REPRINTS
Copyright 2017 Quinstreet Inc. All Rights Reserved.