Zix in the News.

Our experts provide leading insight into email security challenges, solutions and trends.



The Zix team of experts regularly offers commentary and contributes thought-leading articles to technology, industry and business media. Check out all of our insightful contributions below.

In addition, our CEO David Wagner is a member of the Forbes Technology Counsel. To read his latest article, visit this:

Forbes Page

Kick suspicious email attachments to the sandbox

ITProPortal | 05/22/2018

Cybersecurity must simultaneously address two major challenges: identify, deflect, and mitigate every type of cyberattack that does (and will) exist; and provide ironclad security without slowing down operations or interrupting workflows. These priorities are in opposition and conspire to further complicate users' understanding of cybersecurity.

How to Feel Secure With Your Data in 2018

readwrite | 04/20/2018

Implementing multiple layers of security is the common thread for today’s data security strategies. The layered approach has worked in some cases. However, other companies have still become vulnerable to hackers. In fact, numerous large global enterprises with significant technology budgets have fallen victim to hackers. It may make you wonder just how realistic it is to feel secure that your data is truly protected.

What new email security standards mean for federal agencies

Federal Times | 03/28/2018

As of Jan. 15, all government agency domains are required to have Sender Policy Framework (SPF) and Domain-based Message Authentication, Reporting and Conformance (DMARC) records in place, according to an October 2017 order issued by the U.S. Department of Homeland Security — a major step in governmentwide cybersecurity.

What the SEC Has Signaled to Public Companies About Cybersecurity

Innovation Enterprise | 03/23/2018

Historically, cyberattack consequences have ranged from reputation damage to strained partner relationships to heightened investments in IT and security. Increasingly, however, companies must also consider legal and regulatory consequences.

How to Weed the Bad Links Out of Your Inboxes

Security Today | 03/12/2018

While malicious links are not a new cyberthreat, this tactic remains a pervasive and effective hacking technique. For instance, with the Meltdown and Spectre vulnerabilities recently threatening billions of computers, many people, urgent to find information and solutions, clicked a link that arrived unsolicited in their inboxes, purportedly from the German Federal Office for Information Security. The link appeared legitimate and promised to provide a defense strategy. Instead, the very malware that those users were trying to avoid was installed on their computers.

Cybersecurity: Why an Ounce of Prevention Equals a Pound of Cure

CEOWorld | 03/08/2018

Not surprisingly, consumers these days are wary, especially those who have had their personal information exposed in the past. But public sentiment is only one of the many ramifications of a cybersecurity (or repeated cybersecurity) failure. From profits to public fallout, cyberattacks have always been costly, but these costs are now more consequential than ever.

How to promote accessibility in healthcare cybersecurity

Healthcare Business & Technology | 02/27/2018

The healthcare industry suffers a cybersecurity conundrum: While effective healthcare administration depends on the efficient exchange of this information with trusted vendors and other third parties, employees are often a source of security vulnerability.

How Bad PR Can Kill Your Business (and How to Avoid It)

Inc. | 02/20/2018

In the age of social media, the speed at which bad news can spread makes it tough for businesses to manage a crisis. However, it's crucial that your organization have a set plan in place to prevent negative situations -- or, if necessary, deal with issues when they arise.

A Nuclear Response to Cyberattacks? Comprehensive Defense Is a Better Approach

Observer | 02/19/2018

Most of the world hopes there’s never a nuclear response to anything. Yet, the fact that the Pentagon is considering the nuclear option in the event of a cyberattack indicates the growing sophistication and risk underpinning modern cyberwarfare. The Pentagon has issued a report highlighting possible updates to the Nuclear Posture Review, which details the circumstances under which the U.S. will consider responding to an attack with nuclear force.

Why Healthcare Is A Top Target For Hackers

Health IT Outcomes | 02/16/2018

The healthcare field is currently in a precarious position. New technologies promise to improve care and increase the success of outcomes with far greater consistency. But those same technologies create vulnerabilities and invite cyberthreats that put every one of those agendas in jeopardy. U.S. Health and Human Services’ Office for Civil Rights believes the final number of cyberattacks in 2017 will far outpace 2016’s figure.

Displaying results 41-50 (of 118)
 |<  <  1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10  >  >|