How to block incoming users or domains

Hello everyone, Zimbra Collaboration includes anti-SPAM and antivirus technologies such as Postscreen, Spamassasin, Amavis, ClamAV, etc. But sometimes, for legal reasons, etc., we need to block certain senders or even entire domains from sending unsolicited email. To do this, we will use the tools that come native to Zimbra Collaboration, Continue Reading

Search your Archive from WorldClient in 3 Easy Steps

With the prevalence of data-destroying malware, more businesses are using an archiving solution such as MailStore to create backup copies of all email communications. Archiving is crucial for recovery when the unexpected disaster strikes, and useful for e-discovery and meeting legal requirements & regulations. I’ve written this article to help Continue Reading

Byline: The Move to Standardization and Open Architectures Enables Cybersecurity Automation For the Government Sector

As networks become increasingly complex, adding such things as wireless connectivity, cloud services, BYOD, and the Internet of Things, they present increasing opportunities for compromise. Most organizations have deployed a variety of security devices across their network as part of their overall security infrastructure, usually from different vendors. These devices Continue Reading

Q&A: Information Sharing and Trust in Cybersecurity Today

With cybercrime such a big concern these days, cooperation and information sharing between public and private organizations has never been more important. We recently talked with Derek Manky, Global Security Strategist at Fortinet, to get his thoughts on the difficulty, and importance, of trusted networks for sharing information in the Continue Reading

Gone missing: the day a few group members went silent!

Group Replication introduces a new way to do replication in MySQL. With great features such as multi-master replication it brings a range of exciting deployment scenarios where some difficult problems become much easier to solve. Relying on a Consensus protocol – Paxos, to achieve its goal, sometimes we can get into situations where we Continue Reading

Tuning MySQL Group Replication for fun… and profit!

Group Replication introduces a new way to do replication in MySQL. With great features such as multi-master replication it brings a range of exciting deployment scenarios where some difficult problems become much easier to solve. Please check a few recent blog posts about group replication here, here, and here. Group Continue Reading

Bayrob – An Ancient Evil Awakens II

In the previous Bayrob blog, we described some of its interesting local features, such as code obfuscation and data encryption, which exist in most Bayrob variants from early versions to the latest ones we found. As you may already know know, early variants of Bayrob mainly perform “clicker” jobs. These Continue Reading

>