ViewPoint

A perspective on next generation cybersecurity, compliance risks and the cloud

November 20, 2017

5 Common Mistakes Made When Implementing DMARC

Ryan Terry

DMARC, or Domain-based Message Authentication Reporting & Conformance, protects an organization’s trusted domains from email spoofing attacks.  Due to the rapid expansion of

November 13, 2017

Foreign IPs Spoofing U.S. Government Email Domains Underscore Urgency of DHS Directive on Authentication

Robert Holmes

Those of us with a strong interest in restoring trust to the email ecosystem received some great news last month, as the US Department of Homeland Security issued a directive (BOD 18-01) mandating that federal agencies authenticate their email to eliminate spo

November 11, 2017

Email Fraud Continues to Expand its Footprint in Q3 2017

Ryan Terry

Email fraud, or business email compromise, is a growing threat that impacts organizations of all shapes and sizes.  These highly targeted email attacks that spoof trusted executives or partners, often don’t include a payload - such

November 07, 2017

Healthcare Can Improve Cybersecurity Posture With DMARC Email Authentication

Craig Huitema

We authenticate everything we need to trust in IT. Except email. This is part of the reason email is the number one threat vector in healthcare, as well as basically every type of organization.

October 17, 2017

U.S. Government’s DMARC Mandate: A Step in the Right Direction

Robert Holmes

Following a letter by Senator Ron Wyden back in July calling for government-wide use of email authentication, The Department of Homeland Security (DHS) announced on Monday that it would increase security for anyone receiving email from federal agencies or visi

October 16, 2017

Digital Transformation is Redefining Cybersecurity. Are You Prepared?

Ryan Kalember

The rapidly evolving pace of digital transformation promises new levels of efficiency, agility, and responsiveness for your organization, your supply chain, and your customers.

October 05, 2017

Wi-Fi Man-in-the-Middle Attacks: New eBook on What to Know, How to Stop Them

Duane Kuroda

Anyone who leaves home with a mobile phone (i.e. everyone) knows it won’t be long before they connect to a wireless network. And when they do, it had better be a trusted and secure choice so they don’t endanger their personal identity or company data.

October 03, 2017

How to Protect Your Employees, Customers, and Business Partners from Email Fraud

Ryan Terry

Impostor email attacks that seek to defraud recipients through email fraud and credential

August 23, 2017

FINRA And Social Media: What to Expect From New Guidance

Joanna Belbey

In spite of extensive regulatory guidance since 2010, some financial services firms are still baffled by how to comply with communications rules and regulations pertaining to social media.

August 16, 2017

Big Pharma and Social Media: How to Avoid Trouble with the FDA

Joanna Belbey

Pharmaceutical companies can use social media to engage and educate patients as well as to provide reliable information about their products.

Pages