Filter by "Cybersecurity"
- BOD 18-01
- case studies
- CISOs want measurable results
- Customer Advisory Board
- Data Privacy Day
- DMARC enforcement
- Donald Trump
- election hacking
- Email Authentication
- Email Fraud Landscape
- Email Marketing
- Email Marketing Trends
- engineers at valimail
- fake email
- health care
- IDEA platform
- IoT Security Industry
- Mailing Lists
- multifactor authentication
- Office 365
- payroll scams
- press releases
- product design
- product development
- sender identity
- spear phishing
- survey shows
- TAG Cyber
- Trust Layer
Enterprises tend to spend a lot on cybersecurity. So you’d think they’d be insisting on — and getting — measurable resul...
DMARC uses the Domain Name System (DNS) to store records indicating how email receivers should evaluate incoming message...
Valimail is lucky enough to have customers and partners at companies that are innovating and advancing new techniques an...
As we wrote in our previous post on the core problem with email security, the cost of business email compromise (BEC) mo...
There are a lot of initiatives that fall on your team’s shoulders, so I’m sure there’s the question in the back of your ...
Last week, Marriott let the public know that it had suffered a data breach: Hackers stole the data on 500 million guest ...
The DMARC standard defines a number of different tags that can be used in a DMARC record. Some of these tags are require...
Related posts: What is email authentication? What is DMARC? What is DKIM? The five key standards of email authenticatio...
MIT’s Kresge Auditorium, site of the MITSloan CIO Symposium. Photo credit: Gunnar Klack/Flickr We’re happy to announce t...
The movement to implement email authentication is gathering steam, and international cyber security experts are increasi...
There has been a lot of coverage in the media recently about spear phishing and the ‘CEO to CFO’ scam, and for good reas...
Spear phishing has gotten a lot more sophisticated since this photo was taken. Photo credit: Gerry Lauzon/Flickr I work ...
RSA is one of the largest cybersecurity providers in the world, and its annual conference in San Francisco, happening th...
Tax forms! Photo credit: Manchester Library/Flickr via photopin.com With tax season just ramping up for many companies, ...
Dear President-Elect Trump: As you take office on January 20, we are writing with a modest proposal: Make email great ag...
Facepalm. Photo credit: mrhong42/Flickr The U.S. Presidential Commission on Enhancing National Cybersecurity recently de...
Hello…Elvis? Photo credit: Gunnshots Email impersonation scams, also known as business email compromise (BEC) or p...
Leoni AG, a billion-dollar (market cap) manufacturer of cables and cable harnesses for car manufacturers, announced las...
In the just-released 2016 Black Hat Attendee Survey, phishing far-and-away topped the list for the type of attack that s...
Image: thethreesisters/FlickrTurns out some people have given away a whole lot of money to BEC scams. Business email c...
Training won’t get there on its own. Image: US Embassy/Flickr A recent IT World Canada article discusses a presentation ...
Don’t let phishing erode your customer’s trust. Image: Flickr/ Lars Plougmann Email is the top communication channel for...
In its recent report Fighting Phishing: Protect Your Brand Gartner lays out a series of recommended steps to reduce the ...
In the wake of the much-discussed payroll company that fired an employee for falling victim to a spear phishing scam, an...
An employee at payroll service provider Alpha Payroll got fired for falling victim to a phishing scam, as CSO Magazine’s...
The ever-increasing waves of email phishing attacks have spawned a flurry of how-to articles offering advice on how to ...