DMARC can be a confusing topic: Points of view vary and there is no shortage of misinformation out there. But there are some recurring themes worth unpacking.
Category: Dmarc as a Service
Read our latest blogs about DMARC Software as a Service (SaaS).
Did you miss the Valimail LinkedIn Live on March 4? You can still catch the replay of this episode of…
Learn everything you need to know about SPF macros to take better control over your SPF records.
Valimail is a Gold winner in the 18th Annual 2022 Cyber Security Global Excellence Awards®
Watch our demo with our DMARC expert and learn how you can get to DMARC Enforcement using Valimail patented technology.
There is a new zero-day security vulnerability known as Log4Shell that hit the world last week. Here’s what you need to know.
But when it comes to protecting your reputation and building resilience into your brand through email security, the marketing organization just may be the optimal partner.
We’ve communicated with each other in various ways for centuries, always seeking ways to connect. For as long as we’ve had communications, we had to secure them.
Business Email Compromise, or BEC, is a type of scam where cybercriminals impersonate trusted parties, such as the CEO, business partners, or other executives in a company.
Ever since the release of RFC 4408, the first revision of the SPF specification, there’s been a misconception in email…
This post is an excerpt from the Valimail research report, 2020 Election Infrastructure Remains Vulnerable to Email Hacking, which was…
Many people in the software industry are familiar with the joke that says that the definition of the word “recursion”…
How much can you trust that a political fundraising email really came from who it appears to come from —…
Valimail has been monitoring the usage of email authentication technologies in election infrastructure for several years now. Our analysis shows…
M3AAWG’s email authentication checklist is clear, concise, and timely The Messaging, Malware, and Mobile Anti-Abuse Working Group (M3AAWG) recently published…
Partial visibility isn’t enough Of the thousands of cloud applications in the marketplace, only about two percent of them (currently…
Valimail has been tracking and publishing data on DMARC usage since 2017, but this edition of our Email Fraud Landscape series is especially exciting since it’s the first …
Valimail is proud to announce that we are partnering with DigiCert to help companies prepare for BIMI — a new…
Learn how to troubleshoot and validate SVG tiny exports for BIMI with a hands-on walkthrough, SVG validation tools, and frequently encountered issues.
Twilio SendGrid and Valimail have teamed up to provide customers with Valimail’s DMARC Monitor and Enforce solutions, which will help Twilio SendGrid customers further…
Cybercriminals are exploiting uncertainty and fear around the COVID-19 pandemic, with phishing emails targeting individuals and institutions — utilizing spoofed…
Domain spoofing declines as protective measures grow (research part 3) Valimail’s data shows a slow decline in the rate of…
The battle against phishing rages on. Estimates from the FBI peg losses due to just one type of email-based attack,…
Learn how to prevent enterprise email domain spoofing with DMARC and protect your brand, customers, and digital communications.
CISOs want measurable results, survey shows Enterprises tend to spend a lot on cybersecurity. So you’d think they’d be insisting…
Valimail is proud to be a part of the Microsoft Intelligent Security Association, an ecosystem of vendors that have integrated…
There is one unifying factor common to 89% of phishing scams: The sender of the email almost always hides behind…
The new BIMI email standard provides a secure, global framework enabling email senders to provide validated, sender-specific logos that will appear in…
As we wrote in our previous post on the core problem with email security, the cost of business email compromise (BEC)…
In the days of circuit-switched telephony, when Grandma dialed Grandpa, the phone company could easily determine that the caller’s identity…