You probably know by now that any e-mail that isn’t encrypted traverses the Internet in clear text that can easily be viewed with little skill and just some patience. So what are you doing to protect ...
In order to properly secure confidential information — everything from trade secrets to financial data and personal identity information — corporations need policy-based e-mail encryption. But ...
Critical data is only so secure if all your e-mail is sent "in the clear." Roger looks at the benefits and limitations of several options for encrypting e-mail and keeping information safe from prying ...
It isn’t just the big boys that are under the gun on the subject of e-mail privacy; today the bull’s-eye is on mid-sized companies. A vice president in Southern Commercial Bank, for example, ...
You probably wouldn't think twice about ducking into a WiFi-equipped coffee shop, firing up the laptop and hammering out a few e-mails. But what if someone in that coffee shop were reading over your ...
E-mail encryption used to require a lot of time and effort to install and use. That’s no longer true, and we showcase three solutions that are both easy to use and ...
As much as we use e-mail to conduct business today, most small businesses routinely send sensitive messages ‑‑ often containing social security numbers, business deal discussions, corporate secrets or ...
Here on ZDNet, in the blogs, their comment areas, and in e-mails you have not seen, my fellow blogger George Ou and I have been debating the challenges to securing e-mail. Although many Internet users ...
The volume of internet traffic generated by an ever-increasing number of applications, including e-mail, Instant Messaging (IM), web services, Voice over IP (VoIP), and other network transactions is ...
Silent Mail addresses longstanding problems with e-mail encryption: Obtaining and managing encryption keys required for exchanging encrypted e-mails and ensuring that ...
In a column earlier this summer, Frank Hayes discussed the importance of encrypting e-mail [Frankly Speaking, June 4]. He concluded that we’re not doing it routinely because we don’t believe – ...
Billions of supposedly private e-mail messages a day flow through unsecured links, where they can be snared in digital dragnets operated by the National Security Agency and other intelligence services ...