Quantcast
Browsing all 98 articles
Browse latest View live

Five Top Cybersecurity Predictions for 2016

Many security vendors, including Kaspersky and McAfee, have already published their 2016 industry predictions. While these predictions provide a helpful (and quite harrowing) glimpse into cybercrime...

View Article


Image may be NSFW.
Clik here to view.

Think Like an Email Expert: How to Solve a Sudden Boost in SPF Failure Rate

Authenticating legitimate email with open standards such as SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication Reporting and Conformance)...

View Article


Image may be NSFW.
Clik here to view.

Think Like an Email Expert: How to Troubleshoot DKIM Alignment Failures

Email authentication is the sender’s best defense against phishing and spoofing. But ultimately, mailbox providers like Gmail, Yahoo!, and Microsoft have the final say in what gets delivered and what...

View Article

Image may be NSFW.
Clik here to view.

Think Like an Email Expert: Solving for DMARC Low Block Rates

Email senders can take important steps to ensure that their legitimate mail is authenticating properly and suspicious mail is blocked. But occasionally, the delivery decisions of mailbox providers like...

View Article

Top 10 Tips to Protect Your Personally Identifiable Information (PII) for...

Tax season is upon us—and there is nothing more critical than taking steps to protect your personally identifiable information (PII). Last May, cybercriminals used Social Security numbers, birth dates,...

View Article


Image may be NSFW.
Clik here to view.

Build Your DMARC Record in 15 Minutes

Implementing DMARC (Domain-based Message Authentication Reporting and Conformance) is the best way to defend your customers, your brand, and your employees from phishing and spoofing attacks. DMARC is...

View Article

Image may be NSFW.
Clik here to view.

5 Ways Email Marketers Can Fight Phishing

As email fraud becomes more prevalent and the quality of phishing emails continues to improve, users are finding it much harder to distinguish between legitimate emails and fraudulent ones. This is a...

View Article

How to Build Your SPF Record in 5 Simple Steps

To protect your customers, your brand, and your business from phishing and spoofing attacks, you must authenticate your email. SPF (Sender Policy Framework) is an authentication protocol that allows...

View Article


Image may be NSFW.
Clik here to view.

5 (More) Ways Email Marketers Can Fight Phishing

Last week, we discussed five key ways marketers can fight phishing and preserve the ROI of their email marketing programs. This week, we wanted to offer five more excellent anti-phishing tips to...

View Article


Image may be NSFW.
Clik here to view.

Attention, Marketers: Gmail’s Recent Announcement Has Big Implications for...

On February 9, 2016, Google, the world’s biggest email provider, announced that it will help its one billion monthly active Gmail users distinguish between good and malicious messages by showing them...

View Article

Image may be NSFW.
Clik here to view.

New Research: 5 Key Findings from the 2016 DMARC Intelligence Report

More than four years after its launch, Domain-based Message Authentication, Reporting, and Conformance (DMARC) remains the most powerful weapon to date in the fight against phishing and spoofing. But,...

View Article

Image may be NSFW.
Clik here to view.

How to Read Your First DMARC Reports (Part 1)

Have you published a DMARC (Domain-based Authentication Reporting and Conformance) record? If the answer is yes, then you receive DMARC reports that reveal crucial information about your email...

View Article

Image may be NSFW.
Clik here to view.

[Webinar] Making Email Safe: DMARC Trends and Adoption

Today at 12am ET/10am MT, DMARC.org’s Executive Director, Steve Jones, and Return Path’s Senior Product Marketing Manager, Nikki Cosgrove, will team up to discuss findings from the 2016 DMARC...

View Article


5 Essential Tips for Implementing DMARC

Over the years, I have had the opportunity to help hundreds of companies implement the DMARC (Domain-based Message Authentication Reporting and Conformance) protocol—and I’ve learned a lot along the...

View Article

Return Path and GreatHorn Partner to Deliver Integrated Enterprise Phishing...

Return Path is excited to announce a global partnership with GreatHorn, the world’s leading cybersecurity platform for preventing spear-phishing attacks. This partnership provides a complete end-to-end...

View Article


Updates to Yahoo’s DMARC Reject Policy

Yahoo announced on Monday, beginning March 28, 2016, they will update 46 international Yahoo domains with a DMARC reject policy. These are in addition to the existing three domains that have already...

View Article

Neiman Marcus Partners with Return Path to Combat Email Fraud

Today, Neiman Marcus joined the growing list of leading retail brands protecting consumers from phishing attacks by deploying Return Path’s Email Fraud Protection solution. Now, the company, which has...

View Article


Image may be NSFW.
Clik here to view.

Stopping the W-2 Spear Phishing Scam

On March 1, 2016, data storage giant Seagate Technology learned the 2015 W-2 tax form information for current and former U.S.-based employees were compromised due to a spear phishing email....

View Article

Image may be NSFW.
Clik here to view.

Return Path Joins Retail Cybersecurity Association R-CISC as Platinum Member

In an effort to combat the growing threat of email fraud in the retail sector, Return Path is joining The Retail Cyber Intelligence Sharing Center (R-CISC) as a Platinum Member. Created by retailers in...

View Article

Image may be NSFW.
Clik here to view.

How to Read Your First DMARC Reports (Part 2)

If you publish a DMARC record, you receive two types of reports—aggregate and forensic—that contain valuable authentication data. But making sense of that data can be tough. Last month, we reviewed how...

View Article
Browsing all 98 articles
Browse latest View live