CipherTrust

CipherTrust

back to homepage

CipherTrust Free Articles

Alert: New HIPAA Rules Could Affect Your Organization

Failure to adhere to the new ... could cost your company up to $250,000 per ... April 21, 2005 (just over three weeks from today), a new Health ... ... and ...

Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your ... ... the ... bulk of ... ... in many ... is created, stored and ... ... ... by IT and ... via ... ...

Read More

GLBA: Raising Email Security Awareness

... are under the gun to protect ... ... and ... are ... a few weeks ago, one of the world’s largest banks ... that it had lost computer data ... th

Read More

Intellectual Property Theft Has Never Been Easier - Is your enterprise protected?

Intellectual property (IP) is at the core of any business. Confidential manufacturing processes, financial information, customer lists, digital source code, marketing strategies, research data or any other compilation of information used to obtain competitive advantage could be deadly to your enterprise if it ends up in the wrong hands.

Read More

The Anti Spam Challenge – Minimizing False Positives

Email is the quintessential business communication tool, so when it doesn’t work like it’s supposed to, business suffers. Anti spam software is designed to protect your inbox from unwanted messages, but unless your system is properly trained even the best software misses the mark and flags legitimate messages as spam. These messages are referred to as “false positives.”

Read More

2005: An Email Compliance Odyssey - Get your enterprise ready to comply with multiple federal information privacy laws

“The two overarching themes for compliance management in 2005 will be the adoption of best practices and the accelerated focus on and use of IT.” --Gartner Research

Read More

Hall of Shame - The Bad Boys of UCE

The majority of Unsolicited Commercial Email (UCE), or “spam” is sent by a relatively small group of dedicated professional spammers. The Register of Known Spam Operations (ROKSO) indicates that 80% of all spam comes from just 200 known spam operations. This data is in line with research completed by CipherTrust research scientists, which indicates that most spam originates from a relatively small group of tightly integrated spam networks. While we’re all very familiar with the spam messages we receive each day, it is interesting to take a look at who these spammers are – to put a “face” to the problem, as it were. Following are four of the most notorious and prolific spammers in the world. Alan Ralsky Alan Ralsky Mr. Ralsky is currently one of the most egregious spam senders in the world. His organization, based in Michigan since 1997, uses Chinese, European and domestic US-based servers to host and send spam to millions of email boxes daily. But that’s not enough for Ralsky. Not only does he operate as a spammer, but also as a host to other spammers.

Read More

Maximizing E-mail Security ROI - Part IV – The Digital Monsters under Your Bed: E-Mail Intruders

This is the last of a five-part series on Maximizing Email Security ROI.

Read More

Maximizing E-mail Security ROI - Part V – A New Twist to an Old Problem: Email Encryption

This is the last of a five-part series on Maximizing Email Security ROI.

Read More

Your Reputation Precedes You

A Look at the Past, Present and Future of Email Reputation Systems

Read More

Maximizing Email Security ROI: Part III - No More Mr. Nice Guy: Enforcing E-Mail Policy

This is the third of a ... series on ... E-mail Security ... is an easy, cheap and readily ... form of ... It’s a great tool for ... but without proper saf

Read More

Maximizing Email Security ROI: Part II - Stop Viruses Before They Stop You

This is the second of a ... series on ... Email Security ROI. Across the spectrum of ... security risks, most casual users ... the dangers posed by viruses and worms. Netwo

Read More

Maximizing Email Security ROI: Stop Spam and Save!

This is the first of a ... series on ... Email Security ROI In the realm of email security threats, the costs of spam are ... easy to ... Although most ... rarely,

Read More

How Sarbanes-Oxley Affects Corporate Email Systems

The ... Act of 2002 and ... rules adopted by the ... and Exchange ... (SEC) require certain ... to report on the ... of their internal controls over f

Read More

How Spammers Fool Spam Filters

And How to Stop Them ... stopping spam over the ... requires much more than blocking ... IP ... and creating rules based on keywords that spammers ... use. The increas

Read More