Zix Blog

Zix Webinar featuring Forrester Research looked at Hosted Email Encryption

Fri, 01/29/2016 - 11:03 by Neil Farquharson
Guest Speaker Kelley Mak of Forrester Research “The use of email encryption…shows your business partners, your customers, your employees that you take security seriously.” These are the words of Kelley Mak of Forrester Research during our live webcast last Thursday. During our one hour webinar, I posited that many organizations are choosing hosted email and hosted encryption that reduce costs due to organizations not needing to maintain in-house infrastructure any more. The costs are predictable and manageable. One of my takeaways from Kelley’s presentation was that...
Read More

Zix Webinar Features Independent Analyst Discussing Cloud Based Email

Mon, 01/11/2016 - 12:00 by Neil Farquharson
Many organizations are looking to ensure the success of their migration to cloud-based email, either now or in the next few months. While the transition offers cost and time savings, you may soon come across a few limitations, and email encryption is one of them. With the increase in the number of data breaches and external threats, this is not an area of your business operations that you want to overlook. I am delighted to announce that Kelley Mak of Forrester Research will be joining us for our January 21 webinar. He and I will be discussing how Zix Email Encryption interoperates with many...
Read More

Zix’s Hacker Series Continues: David Kennedy on Mobile Devices

Thu, 10/22/2015 - 11:15 by Neil Farquharson
Regular readers may remember this blog referring to the ease with which hackers can intercept emails being transmitted over unprotected fiber optic cables. I’m now pleased to share with you that David Kennedy, the renowned security expert, has agreed to be interviewed during a live Webinar scheduled for November 11 th at 2 p.m. ET. During the interview, I will ask David for his views on the current security levels of mobile devices such as smartphones and tablets. Just how easy is it to compromise mobile devices remotely, or while in the physical possession of hackers? Can operating...
Read More

Mitnick Interview Goes Live Today

Wed, 06/17/2015 - 10:47 by Neil Farquharson
You may remember this blog from the last month when I reviewed the then forthcoming Kevin Mitnick video. Well the release date has arrived and today you can watch the forty minute interview of Mitnick by Geoff Bibby. When in college, Mitnick admits to having been bored with the assignments set by his tutors. He uses the term “prankster” often and states that he never hacked a system to make or to steal money. When asked by Bibby what motivated him back then, Mitnick replies “it was [for the] pursuit of knowledge, challenge, and the seduction of adventure.” Clearly for...
Read More

Review of Kevin Mitnick Video

Fri, 05/29/2015 - 10:44 by Neil Farquharson
I hardly recognized Kevin Mitnick when I met him at RSA back in April. He looked nothing like the dour, baggy eyed and stubble chinned image in his wanted poster from 1994. He was fresh faced and ebullient, and there was a constant flow of fans, young and old, lining up to meet him or to renew his acquaintance. In the world of on-line security, he is a superstar. So you will not be surprised to hear that when I was offered the opportunity to preview the upcoming video of Mr. Mitnick’s interview by Geoff Bibby , I jumped at the chance. And I have to say, the video is both enthralling and...
Read More

The Community of Trust for Email Encryption

Tue, 04/07/2015 - 14:15 by Neil Farquharson
Back in 2007 Jay Heiser, a respected researcher in on-line security and privacy, described a Community of Trust *, this being a secure, multi-organizational collaborative community working within a highly trustable digital environment. The topic of the Community of Trust came up several times during last week’s Zix Webinar . During the webinar, I had the pleasure of interviewing Frank Klimczak of Genisys Credit Union based in Michigan whose company has been a member of the Zix Community of Trust for over eight years. Frank described in some detail how easy it is for the staff at Genisys...
Read More

Privacy and BYOD – How our Landscape is Changing

Tue, 01/13/2015 - 10:54 by Neil Farquharson
I’ve been watching privacy issues here in the US and around the world, particularly as they pertain to BYOD. Let me tell you, 2014 was quite a year for privacy issues and individual rights. Around the US we had a number of lawsuits by employees against their employers for expecting them to answer their phones and emails 24/7 but not paying them for this out-of-hours work. Then in May, the European Court of Justice ruled against Google forcing Google to respond to demands to erase private information from browser listing – the so called Right to be Forgotten . Then in July, US policing experts...
Read More

Upcoming Data Loss Prevention (DLP) Webinar: Solutions for Today’s Greatest Security Challenge

Tue, 07/29/2014 - 16:17 by ZixCorp
Every year, healthcare organizations, financial institutions, government agencies and businesses devote huge investments to prevent threats and boost compliance and security measures. Yet one salient fact remains: often the worst breaches and policy violations stem from human error — well-meaning employees who have no idea that they are putting patient records, credit card information and client identities at risk. Often, this data loss occurs through email, such as mentioning restricted information in outside correspondence or attaching documents that may violate customer or patient privacy...
Read More

Upcoming BYOD Webinar: State of Mobile Security in 2014

Mon, 07/14/2014 - 11:14 by ZixCorp
What BYOD challenges, security risks and technologies are companies responding to in 2014? Find out by joining our webinar on July 15 at 2:00 p.m. ET when we showcase findings from the recent BYOD & Mobile Security Spotlight Report conducted by Holger Schulze of Information Security Community. More than 1,000 IT decision makers were surveyed about the mobile threats facing their organizations and the BYOD solutions and strategies being used to combat them. During this webinar, Holger and ZixCorp expert Geoff Bibby will discuss new BYOD insights, surprising trends and fresh perspectives on...
Read More

Upcoming Encryption Webinar: Learn How Zix Can Secure your Office 365 Email

Tue, 05/20/2014 - 15:54 by ZixCorp
With Office 365, organizations have access to business-class email along with cloud-hosted applications that can be accessed through a myriad of devices and online conferencing. The one thing it doesn’t offer is strong email encryption. If you work in a regulated industry, share sensitive information via email or just want to simply make sure your email data is safe – you will need to turn to an outside partner. Not to worry, Zix has your back with its simple Office 365 integration. By choosing ZixGateway , Office 365 users have access to hosted email and easy-to-use, secure encryption from...
Read More

Pages

Subscribe to RSS - Webinar

Switching to Zix Just Got Better

50 percent or more off your first year when you switch to Zix Email Encryption by Feb. 28, 2017, from an eligible competing solution.

Learn More