Resources

Blog

DMARC identifies 90% of Top Malicious Attacks

"A 3 month analysis of the top US malicious email campaigns shows DMARC would have identified 90% of these malicious attacks"Over 20 months ago, industry titans including Paypal, Google, Microsoft, Yahoo!, AOL, and Facebook banded together to launch DMARC, a new approach to reducing email phishing/spamming. In the short period since, DMARC has deployed rapidly and now covers 80% of US consumers...
Blog

EU Regulations - The Latest Instalment to Protect European Data

Blog by Kevin Bailey, Head of Market Strategy. They say that there is no smoke without fire and the proposed EU Data Protection Regulation (EU DPR) that will supersede the previous EU Data Protection Directive 95/46/EC maybe the fire from which a lot of smoke and hot air has been expelled from Belgium over the past 2 years.
Blog

Information Management Responsibility?

The management of information is primarily the owner’s responsibility and secondly the responsibility of all other stakeholders that may have a vested interest in the information, or the data owner. In a world where individuals and businesses are becoming engulfed in new data every day; personal ownership needs to take a more pro-active role in its management.
Blog

Strategies to Keep Your Business Secure

When it comes to the security of your business, you can never be too careful. We’ve talked about the precautions that consumers should take to keep their personal information secure and out of the hands of cyber criminals. Now let’s talk about what businesses need to keep in mind to keep their data and employees safe. Cybersecurity within a business is especially important for various reasons. To...
Blog

Adaptive Redaction - A World First in a Challenging Cyber Landscape

Following on from our recent acquisition news, I’m excited to share more news today. In the latest release of our award-winning Secure Web and Email Gateways we have added a world first: Adaptive Redaction technology. This is another step on our journey toward being a leader in the Information Governance space.
Blog

How Phishing is Enabled Through Hacktivism

A report from RSA suggests that hacktivists are indirectly responsible for a portion of phishing attacks. "Hacktivism and the Case of Something Phishy" details how hacktivists are enabling phishing and other types of cybercrime by exposing various databases for their own agendas via a public download link. When this occurs, cybercriminals are quick to swoop in and pillage information including...
Blog

Cracking The Code On DKIM

Mathematician Zach Harris, 35, of Jupiter, Fl., poses for a portrait on Tuesday. Photo: Brynn Anderson/Wired As you may have seen, either via the US-CERT alert or the story in Wired Magazine , a configuration error in DKIM signing implementations was publicized the week of October 22, 2012. This is NOT a weakness in the DKIM specification or the DMARC standard. This is solely a potential...
Blog

DMARC - A Tectonic Shift In Email

The world of email changed forever when fifteen companies–including Agari, Google, Yahoo, AOL, Microsoft, PayPal, Facebook, LinkedIn and American Greetings–publicly announced DMARC.org. This working group has focused on putting the kibosh on domain phishing and brand hijacking. The new specification describes a scalable method for Email Senders and Receivers to work together to directly check the...
Blog

Email Giants Move to Slash 'Phishing'

Email-service providers Google Inc., Yahoo Inc., Microsoft Corp. and AOL Inc. are backing a new effort intended to dramatically reduce "phishing" emails—which attempt to trick recipients into thinking they come from a legitimate source. The companies—along with others such as financial-service companies Bank of America Corp., FMR LLC's Fidelity Investments and eBay Inc.'s PayPal—are hoping to...