Filter by "DKIM"

M3AAWG’s email authentication checklist is clear, concise, and timely

The Messaging, Malware, and Mobile Anti-Abuse Working Group (M3AAWG) recently published a best-practices document on ema...

by Seth Blank
September 17, 2020
Read more
The benefits of BIMI — and how to get ready for it

BIMI logos can boost engagement in email marketing campaigns. This post explains the details of the BIMI standard. For t...

by Valimail
July 16, 2020
Read more
7 common mistakes people make with DMARC

Interest in DMARC is growing exponentially, but most of the organizations that deploy DMARC don’t actually achieve its f...

by Valimail
March 26, 2020
Read more
The 10×10 promise for magnifying email effectiveness

For marketers, email deliverability and open rates are more than core metrics. They are critical components of brand ide...

by Danny Williams
November 15, 2019
Read more
Why are so many companies still not protecting themselves from phishing attacks? [Video]

Email is far from dead. In fact, it’s the number one cyber attack vector. And yet, the majority of companies still haven...

by Gabby Williams
May 22, 2019
Read more
The five key standards of email authentication

What does it mean when someone talks about “email authentication?” It’s pretty straightforward: When an email message ha...

by Valimail
February 21, 2019
Read more
Five myths of email authentication

Email is one of the most vulnerable points in an enterprise’s cyber defenses. Multiple studies (from Proofpoint, Verizon...

by Alexander García-Tobar
February 11, 2019
Read more
Breaking DKIM? Or simply misunderstanding how it works in practice

A recent post by German software developer and security researcher Steffen Ulrich claims that it’s possible to create e...

by Peter Goldstein
October 4, 2017
Read more
DKIM for ESPs: The struggle of living up to the ideal

Note: A version of this post also appeared on CircleID. Given the increase in email fraud (phishing) and an increasingly...

by Valimail
December 15, 2015
Read more