contact contact contact
 Advertise
 Contact
 SecurityWatch
  Articles | Editorials | Reviews | News | InfoSec Directory | Releases | Submit PR

GFI MailArchiver for Exchange - Easily archive Exchange Server mail & comply with Sarbanes Oxley - Free evaluation available.

Network Security Software - Sponsored by GFI Network Security.

Free VoIP Assessment for your business

IT Professionals Drive Toward E-Mail Authentication
Author: IT-Observer Staff
Friday, 13 May 2005, 11:21 GMT

IT Professionals, Business leaders and other executives will gather together to learn how e-mail authentication techniques, implemented by the online industry, are helping protect business and consumers from phishing attacks and e-mail fraud.

On July 12 at the Marriott Marquis in New York City, E-mail Authentication Implementation Summit 2005 will highlight IP-based verification techniques and signature-based approaches.

The summit will focus on newly developed techniques such as Yahoo’s DomainKeys, Cisco’s Identified Internet Mail, Sender ID Framework and other. The summit will provide businesses recommendation how to implement e-mail authentication techniques by using real-world cases of deployment.

"Solving the problem of spam starts with being sure you know who's sending the mail," Esther Dyson, editor of Release 1.0 at CNET Networks Inc., said. “One big obstacle to this desirable state of affairs is the corporate world's lack of knowledge about sender authentication.”

“Summits such as this one are vital to help get business leaders and IT professionals up to speed on how to implement these techniques and benefit from the significant advances the IT industry is making to help protect e-mail users, “Dyson concluded.

Monday, May 23, 2005

Network Security

· Hackers get tricky with pharming
· Hiring a hacker? Think again, experts warn
· Why security vulnerabilities expand beyond operating system, enterprise
· How Dangerous Was The Cisco Code Theft?


Free VoIP Assessment for your business


Wireless Security

· picoChip, Hifn unveil WiMAX basestation reference
· Why wireless devices must be connected to critical applications
· Securing 'strange' Wi-Fi devices
· IT giants fight wireless patent

InfoSec Directory

· Phishing attacks and countermeasures
· Overview of image security techniques with applications in multimedia systems
· Inoculating SSH Against Address-Harvesting Worms
· What is the point of encryption if you don’t know who for?


Free VoIP Assessment for your business


Press Releases

· nCipher helps combat phishing attacks with Chip and PIN
· LANDesk Named to 2005 Red Herring Top 100
· HP Simplifies Business Protection for Small and Mid-size Businesses with New Smart Office Program
· Clifford Chance appoints Redbus Interhouse to Provide Pan-European Services
 Copyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: Privacy 
Site Meter