Information Security Leader, Author, Instructor and Speaker

Default utility Image

Anatomy of a Spam Attack TAGS: | “High-quality pharmaceuticals direct to you from our Canadian pharmacy. No prescription required, discreet and confidential. Viagra, Levitra, and more direct …Continue reading →

Default utility Image

Battling image spam TAGS: | You’ve installed keyword-based spam filters and invested countless staff hours tuning its performance to suit your environment. Perhaps you’ve even …Continue reading →

Default utility Image

Esafe 4.0 TAGS: | | | Content filtering typically means a mix of antivirus and antispam software, and a variety of e-mail, IM, Web and URL …Continue reading →

Default utility Image

Get the spam out of here! TAGS: Let’s face it – spam is becoming a serious problem. Just a year or two ago, it was a minor …Continue reading →