March 17, 2017
Although minting authentication cookies is not widely understood, the Yahoo hacker indictments has brought it to the forefront and shown it can be very dangerous.
March 15, 2017
This is a guest blog post by Bhavin Turakhia, Founder and CEO of Flock Today, collaboration is a key to a company’s success. It is therefore critical to understand that collaboration itself can be ...
February 09, 2017
Dunkin' celebrates progress on digital initiatives, but using digital tech to deliver customer value is no slam dunk, says Forrester's Nigel Fenwick. Read which factors matter.
January 26, 2017
Microsoft notches another win in its battle to protect cloud data privacy, as an appeals court quashes the DOJ appeal over a warrant for data stored in an Ireland data center.
Email Get Started
Bring yourself up to speed with our introductory content
Threat intelligence tools are a phenomenal addition to your security posture; they just can't be your security posture. Learn where they fit into your security scheme. Continue Reading
A discovery mailbox is used to perform e-discovery searches for Exchange Server and Exchange Online environments. Continue Reading
A poison mailbox is a corrupted mailbox on the Exchange Server that causes disruptions on the Exchange database store. Continue Reading
Evaluate Email Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
This Editors' Choice takes a look at the features of Package Track, an electronic system that helps mailrooms gain control of their inventory, pickups and deliveries. Continue Reading
As team messaging applications such as Slack and Cisco Spark grow in popularity, they could decrease reliance on email, 1-800 customer service numbers and even LinkedIn. Continue Reading
Gone are the days of dial-up internet and ubiquitous AOL accounts, when Meg Ryan had mail and no one owned a smartphone. Yet, many years and seven iPhone generations later, email -- for all its frustrations and shortcomings -- still reigns as the undisputed norm when it comes to workplace communication. And while many desk jockeys bemoan their fraught relationships with overflowing inboxes, most also consider email a necessary evil of modern life -- hard to live with, but impossible to live without.
The rising popularity of the new team collaboration apps, however, suggests email might ultimately prove more vulnerable than many believe. In this special edition of Network Evolution, we explore how the growing adoption of team collaboration apps -- such as Slack, Unify Circuit, Cisco Spark and Microsoft Teams -- creates a ripple effect in the mainstream enterprise that reaches beyond internal, employee-to-employee communication. Hear from one company that uses a messaging platform to communicate with customers, and find out why another early adopter believes team collaboration apps could even threaten LinkedIn as the go-to business-to-business social media platform.
Also in this issue, learn more about the "land-and-expand" phenomenon helping these team collaboration apps gain footholds in the mainstream enterprise, and hear from a unified communications expert on the security risks of relying on open source collaboration software.Continue Reading
Learn to apply best practices and optimize your operations.
Microsoft's Office 365 reporting tool gives administrators flexibility with how reports are generated and ways to monitor the consumption of the cloud platform. Continue Reading
A healthcare ransomware attack may be inevitable. They've increased 300% since 2015. One CIO says that prevention measures and backups are key to protecting the organization. Continue Reading
Relios sells jewelry. But its customer base isn't monolithic, so it uses analytics tools to send the right message to the right people. Continue Reading
Problem Solve Email Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The response to an employee clicking on a malicious link is important for organizations to get right. Expert Matthew Pascucci discusses how to handle the aftermath of an attack. Continue Reading
Too much talking and not enough listening equals boredom and ineffectual meetings. Columnist Jennifer Lent has great advice on how to keep regular Agile gatherings lively and relevant. Continue Reading
Companies still need to be convinced that content marketing strategies are must-haves in the marketing toolkit. Continue Reading