Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Time-Tested Email

Magazine's marketers improve email response rate with 'trusted' class of email that bypasses ISP spam filters

Okay, so now there's good spam and bad spam.

Time Consumer Marketing Inc. this week completed a test of a new "trusted" email certification service that lets advertisers bypass Internet service providers' spam filters for a fee.

In a three-month test, Time used Goodmail Systems' CertifiedEmail service, in which accredited senders with good email practices can choose to send their marketing messages with a cryptographically-secure "token." The token enables the messages to be delivered directly to the service provider customer's mailbox intact, without being filtered or stripped of key content by anti-phishing tools.

Eventually, CertifiedEmail might become a "class of service" that enterprises can purchase on a per-message basis to help ensure the intact delivery of their marketing materials.

Interestingly, Time executives said they did not see much difference in the rate of successful delivery via the Goodmail service during the trial. However, the customers who received the Goodmail messages, which are marked with a "certified" tag, were about 30 percent more likely to click on them and follow the links inside.

"CertifedEmail messages resulted in higher click-throughs and improved response rates," said Ernie Vickroy, a marketing director at Time Consumer Marketing.

Proponents of "Net neutrality," however, cited the service as another example in which senders with deep pockets will enjoy different treatment of their Internet traffic than everyday senders. A spokesman from MoveOn.org Civic Action said his organization opposes the new service.

— Tim Wilson, Site Editor, Dark Reading

  • Goodmail Systems Inc.

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    When It Comes To Security Tools, More Isn't More
    Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
    US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
    Seth Rosenblatt, Contributing Writer,  1/11/2021
    IoT Vendor Ubiquiti Suffers Data Breach
    Dark Reading Staff 1/11/2021
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    2020: The Year in Security
    Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
    Flash Poll
    Assessing Cybersecurity Risk in Today's Enterprises
    Assessing Cybersecurity Risk in Today's Enterprises
    COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2021-01-17
    Netsia SEBA+ through 0.16.1 build 70-e669dcd7 allows remote attackers to discover session cookies via a direct /session/list/allActiveSession request. For example, the attacker can discover the admin's cookie if the admin account happens to be logged in when the allActiveSession request occurs, and ...
    PUBLISHED: 2021-01-15
    An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token. An attacker can construct ...
    PUBLISHED: 2021-01-15
    Docker Desktop Community before on macOS mishandles certificate checking, leading to local privilege escalation.
    PUBLISHED: 2021-01-15
    OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which can lead to pre-auth remote code execution. AttachmentUploadServlet deserializes untrusted data from the `Attachment-Support` header. This Servlet does not enforce any authentication or a...
    PUBLISHED: 2021-01-15
    OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, AttachmentUploadServlet also saves user controlled data (`request.getInputStream()`) to a user specified location (`request.getHeader("File-Name")`). This issue may lead to arbitrary file upload which can be used to u...