Tag: encryption

Encrypting Sent Email — An Often Overlooked Part of End-to-End Encryption

September 26, 2012

You are proactive and security conscious.  You use end-to-end encryption software, like PGP or S/MIME or LuxSci SecureLine, to send your sensitive messages to their destinations, ensuring that the message content is encrypted the entire way … because otherwise, email is just plain insecure. Oh – but what about the copies of these messages saved […]

Enforcing Email Security with TLS when Communicating with Banks

November 3, 2008

LuxSci has had many requests from clients who have to communicate with various bank and other security-conscious organizations that LuxSci “enforce the encryption of email when sent to those organizations email servers via TLS”. This is such a common request, that I wanted to explain what it means, why it is good, how LuxSci does this by default, and the extra step LuxSci can take to lock down things even more for you.

Content-Driven Automatic Email Encryption

June 30, 2007

LuxSci’s SecureLine end-to-end email encryption service now allows you to set up rules to automatically encrypt only certain messages based on keywords, phrases, and regular expressions that appear within the content.

Sending Ultra Secure Messages Just Got Easier!

December 17, 2005

SecureLine-licensed users can add two new options to the cutting edge features of SecureLine email so that users can send and receive secure email messages directly from any email client without additional software to install! SecureLine Automatic Outbound Encryption will automatically encrypt email messages sent from any email program if the recipient(s) are other SecureLine […]

Email and Text Messaging Security in the Wired and Wireless Worlds

August 1, 2002

International Lecture by Dr. Erik Kangas “Internet email, Internet instant messaging, and mobile short text messaging are related in that they enable communications by pushing messages from sender to recipient over generally insecure networks. The security issues and vulnerabilities inherent in all three modes of communication are also very similar. This talk will review standard […]