I had a number of very good conversations with clients yesterday on a trip to the San Francisco Bay Area. In one of those discussions, we focused on email and the fairly blasé attitude that many have toward resolving its problems. Email, after all, i
One of the outcomes of spammers and phishers becoming craftier is the development of tools to keep an eye on network traffic scanning for unusual activity. Intrusion protection systems and intrusion detection systems, once novel are becoming more com
A comprehensive set of best practices covering anti-bot and malware, anti-spam and emerging mobile abuse was jointly released last week by the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) and the London Action Plan (LAP). The repor
Late last week, an advisory was published by the Online Trust Alliance(OTA) with a “severe / immediate action required” status.
Here is the advisory:
The ability to exploit weak DKIM keys has recently been highlighted in the media. This awareness mea
“I have a data stream that will be sent as daily emails containing temperature and wind speed from a measurement site. Our email system is Outlook…”
“We are a GroupWise 6.5.5 shop. We have a new employee who
Domain-based Message Authentication, Reporting and Conformance (DMARC) is a relatively simple authentication method designed to combat the growing problem of spoofed emails, particularly those that are designed to fool receivers who are the targets o
Please, subscribe to get an access.