Communications Security
Communications Security | News, how-tos, features, reviews, and videos
A formula for measuring real-world email security efficacy
You have the data needed to assess the efficacy of your email security tools. Here's how to use it.
Microsoft help files repurposed to contain Vidar malware in new campaign
A new email malware campaign hides a malicious payload in what appears to be a Microsoft Compiled HTML Help file.
Cloudflare unveils email security tools, free WAF ruleset, and API gateway
Cloudflare has announced a slew of new products, including a suite of email security tools for phishing and malware detection, a free WAF ruleset and a machine-learning powered API gateway.
INTERPOL and Nigerian Police bust business email compromise ring, arrest 11
Operation Falcon II focused on malware skills and knowledge to track suspects thought to be members of the SilverTerrier BEC network that has harmed thousands of companies globally.
CISOs, what's in your travel security program?
It's time to review (or create) your travel security program now that more people are traveling for work and pleasure. Here's what it should include.
9 video chat apps compared: Which is best for security?
Zoom, Microsoft Teams, Google Meet, Cisco Webex, FaceTime, Tauria, Signal, Wire and WhatsApp. What does their encryption look like? What are the trade-offs?
9 cloud and on-premises email security suites compared
These email security suites have evolved to keep pace with email-enabled threats.
Microsoft Exchange Emergency Mitigation: What admins need to know
The Emergency Mitigation service adds protections to Exchange Server in the wake of recent zero-day compromises.
4 steps to protect the C-suite from business email compromise attacks
Preventing top executives from becoming BEC victims requires a different approach. Putting the risk in business terms is key.
Exchange Autodiscover feature can cause Outlook to leak credentials
A design issue in the Microsoft Exchange Autodiscover feature can cause Outlook and other third-party Exchange client applications to leak plaintext Windows domain credentials to external servers. Here’s what companies can do now to...
Unpatched Exchange Servers an overlooked risk
Attackers are targeting older, unpatched Microsoft Exchange Servers with much success because organizations don't properly assess the risk.
Business email compromise (BEC) attacks take phishing to the next level
Business email compromise (BEC) is a highly targeted, email-based attack that tricks victims into exposing company information, handing over money, or getting them to perform other acts that negatively impact the business.
4 steps to prevent spear phishing
Your users are in the crosshairs of the best attackers out there. Follow these steps to better protect them.
17 cyber insurance application questions you'll need to answer
Recent high-profile security incidents have tightened requirements to qualify for cyber insurance. These are the tougher questions insurance carriers are now asking.
5 best practices for conducting ethical and effective phishing tests
Phishing tests have become a popular feature of cybersecurity training programs, but they should follow ethical frameworks to ensure they don’t do more harm than good.
4 tips for partnering with marketing on social media security
Threat actors watch social media accounts to gather intelligence about a targeted company. Here's how to get marketing to work with security to minimize the risk.
China’s exclusion from US 5G market likely to continue with Biden administration
Telecom insiders discuss supply chain security and call for better communication, collaboration, and transparency from the federal government about threats within their industry.
New Microsoft 365 defaults, Application Guard beta add email protections
Microsoft has made it harder for attackers to redirect email responses or leverage malicious attachments. Here's how to review the impact these new features will have on your business.