More articles by Ray Everett-Church

Security Watch: Obama on Privacy
By Ray Everett-Church |  Article Published January 27, 2009
The new administration may get some of the big issues right, yet smaller concerns like data-mining your Web cookies and protecting the rights of “legitimate” marketers to pump out spam might succumb to business as usual.
McColo and the Difficulty of Fighting Spam
By Ray Everett-Church |  Article Published November 20, 2008
In a world full of spamming, phishing and other fraudulent behavior, even the most battle-tested spam investigators are hard-pressed to assess who’s to blame and who’s been framed.
Spam, Free Speech and the Founding Fathers
By Ray Everett-Church |  Article Published October 20, 2008
A recent ruling by the Virginia Supreme Court, which threw out a spammer’s conviction, reveals deep confusion about technology.
The Hassle of iPhone Passwords
By Ray Everett-Church |  Article Published October 14, 2008
After we admit we’re iPhone addicts, we need to admit we’re creating easy-to-hack iPhone passwords because the device’s too-tiny keyboard makes anything else a hassle. And that’s a serious problem.
How To Get Your Email Past Clients' Spam Filter
By Ray Everett-Church |  Article Published August 19, 2008
Achieving “deliverability,” otherwise known as getting email delivered to a user’s inbox in a timely and fully-functional fashion, is both an art and a science.
Web Ad Firm Learns People Don't Like Spying
By Ray Everett-Church |  Article Published July 22, 2008
Ad firm NebuAd rushed into business with a massive blind spot. The irony is that Congress caved into terrorism fear-mongering and voted to allow the government to do precisely what it frets about NebuAd doing.
Emailers Still Struggling with Authentication
By Ray Everett-Church |  Article Published June 20, 2008
While over 50 percent of email is authenticated in some fashion, smaller companies lag behind in this key security concern.
The FTC's New Spam Rules: Sender Beware
By Ray Everett-Church |  Article Published May 27, 2008
The Federal Trade Commission has approved the Final Rule, which makes it easier than ever for consumers to add companies to the spam list.
Social Networking Spam: Just Say No
By Ray Everett-Church |  Article Published April 22, 2008
If we all exercise a little restraint, perhaps we can save our favorite fledgling communities from their own worst traits.
Organizing IT Chaos through Email Authentication
By Ray Everett-Church |  Article Published March 21, 2008
Undertaking the sometimes daunting task of deploying authentication provides a great excuse for IT managers to begin tackling the sprawling beast that is today's modern corporate email infrastructure.
Businesses Reach the Tipping Point in Email Authentication
By Ray Everett-Church |  Article Published February 19, 2008
A new survey shows that more than half of businesses now use an email authentication scheme. Those that don’t are starting to lose a competitive advantage.
Spam Wars: When Good Geeks Say Bad Things
By Ray Everett-Church |  Article Published January 22, 2008
When the first reaction of the industry's best minds is to spew vitriol on network administrators who are (finally!) taking steps to secure their networks, the challenge facing today's security professionals is as great as ever.
You've Got Spam: The New Field of Reputation Management
By Ray Everett-Church |  Article Published December 18, 2007
Certain email snafus can be fatal to the effectiveness of a company's entire email strategy and can tarnish the goodwill associated with their good name.
DKIM-a-Palooza
By Ray Everett-Church |  Article Published November 19, 2007
If you manage email systems and aren’t familiar with DKIM, you may still have time to learn about it. But you don’t have the luxury of ignoring it.
Fear and Loathing in an Airport Check-In Line
By Ray Everett-Church |  Article Published October 16, 2007
A new security service promises a shorter airport check-in, but an expert user isn’t thrilled by it.
Microsoft's New Patent: The Dark Side of SaaS
By Ray Everett-Church |  Article Published September 24, 2007
A new patent for notifying people when a privacy policy has changed suggests some dark possibilities for the future of software-as-a-service.
The Las Vegas Counterfeiting Story: Is Your Privacy Worth More Than a Poker Chip?
By Ray Everett-Church |  Article Published August 27, 2007
What happens in Las Vegas stays in Las Vegas, unless it spotlights how companies are tearing down the last remaining personal data protections.
Spam: You've Come a Long Way, Baby
By Ray Everett-Church |  Article Published July 27, 2007
The author reports on the recent FTC "Spam Summit," and contrasts it with a similar event he attended ten years ago.
Google's Race to the Bottom
By Ray Everett-Church |  Article Published June 25, 2007
A new report claims Google has an “entrenched hostility to privacy.” Does the search giant need a Chief Privacy Officer?
Vista's Faux Security
By Ray Everett-Church |  Article Published February 23, 2007
An endless series of meaningless choices does not equal privacy, argues a security expert. Nor will they equal security for Vista.
Medical Identity Theft: Enough to Make You Sick
By Ray Everett-Church |  Article Published January 17, 2007
Ever wonder what mistakes are in your medical records? Even worse: fraudsters are using these mistaken records to con the healthcare system.
2005: The Year We Didn't Solve Spam
By Ray Everett-Church |  Article Published December 19, 2005
Columnist Ray Everett-Church says we could have solved the problem of spam this year. It is doable. We just need to believe it can be done.
Where was Sony's Privacy Officer?
By Ray Everett-Church |  Article Published November 21, 2005
Columnist Ray Everett-Church wonders if a privacy officer could have kept Sony out of the DRM mess the music giant finds itself in.
In Search of Authentication's Holy Grail
By Ray Everett-Church |  Article Published October 17, 2005
Columnist Ray Everett-Church looks ahead to the day every checking account, credit card and coffee honor card comes with its own authentication gizmo. How do we avoid ending up in that mess?
AIM: Getting More than You Bargained For
By Ray Everett-Church |  Article Published September 19, 2005
eSecurityPlanet columnist Ray Everett-Church says AOL's Instant Messenger software gives him more than he bargained for -- more intrusive behavior and way more annoyance.
Microsoft and Claria -- Going Soft on Malware
By Ray Everett-Church |  Article Published July 18, 2005
Columnist Ray Everett-Church says Microsoft's move to acquire Claria shows -- again -- that the software giant has gone soft on malware.
Privacy Officers: Security Types Need Convincing
By Ray Everett-Church |  Article Published June 14, 2005
Some security pros are skeptical about bringing in a chief privacy officer. But a good CPO can be complementary... and can get the CSO out of some tight spots.
Privacy Lessons: A Tale of Two Jobs
By Ray Everett-Church |  Article Published April 18, 2005
In just the last two weeks, two high-profile jobs in the worlds of privacy and Internet public policy were filled, and the appointments say a lot.




Close
Thanks for your registration, follow us on our social networks to keep up-to-date