Email and IoT security issues persist
New AT&T research shows many businesses are not effectively protecting their data. As more organizations adopt cloud architectures, traditional security protections …
New AT&T research shows many businesses are not effectively protecting their data. As more organizations adopt cloud architectures, traditional security protections …
In this podcast recorded at RSA Conference 2017, Grant Shirk and Veliz Perez, Head of Product Marketing and Product Marketing Manager at Vera respectively, talk about how the …
GreatHorn announced the launch of the GreatHorn Threat Platform (GTP) at RSA Conference 2017. The Threat Platform extends the capabilities of the company’s cloud-native …
Vera for Mail is an enterprise-grade security solution that lets businesses secure, track, and revoke access to any email they send. Built on Vera’s data-centric security …
Gmail shows no warning as it delivers legitimate-looking spoofed emails seemingly coming from an existing Gmail.com address, even though they come from a non-Gmail server. …
It is – or it should be – a well known fact that attackers occasionally email potential victims with PDF attachments containing malware or exploit code. But the …
Lavabit, the secure encrypted webmail service used by Edward Snowden, is back online. Lavabit founder and operator Ladar Levison shut it down in 2013 when the US government …
Most of the world’s largest businesses fail at attempts to use open industry standards to control which email is sent using their names. Three quarters of large …
Following Donald Trump’s victory in the latest US presidential election, many people begun to worry about the surveillance capabilities that will now effectively be left …
First Look Code has released GPG Sync, an open source tool for keeping a list of GPG keys used by members of an organization always updated, and always available to all of …
It’s no secret by now that email has become the number one tool for cyber criminals and fraudsters. Earlier this year the FBI predicted that Business Email Compromise attacks …
In 2015, Yahoo created custom software for covertly scanning their customers’ incoming emails, and deployed it on behalf of a US intelligence agency, Reuters reported on …