Log in

Forgot password?

Search the site...


Threat Hunting: What is it and How is it Done?

2073 0

What's next

Sender Policy Framework (SPF): Email Authentication Protocol

“Malicious actors send 3 billion spoofed emails every day and since 2016, organizations have lost over $26 billion due...

DomainKeys Identified Mail (DKIM): Email Security Protocol

“According to Google, in 2016, 86.8% of inbound emails were signed with DKIM. In 2013, it was 76.9%.” (Source:...

A Guide to DKIM Key Rotation and Why is it Important?

Since 2007, DKIM has been a well-established email authentication protocol. However, in the implementation of DKIM, administrators often make...

Post a comment

Your email address will not be published. Required fields are marked *

No Comments