Einblicke zum Thema Cyber Resilience

JETZT ABONNIEREN

Brand Protection
Getting to p=Reject, Mimecast’s Internal DMARC Project: Part 2

A DMARC project goes well beyond just DNS administration; team structure and proper owned … Read More >

A DMARC project goes well beyond just DNS administration; team structure and proper owned domain discovery, categorization, and prioritization will ensure a smooth journey to p=Reject. In my first blog on Mimecast’s internal DMARC project, I laid the groundwork for why we chose to embark on th… Read More >

Matthew Gardiner

by Matthew Gardiner

Principal Security Strategist

Posted Aug 20, 2020

Brand Protection
Brand Impersonation: It Happens to Security Vendors, To…

Credential theft and revenue l… Read More >

Credential theft and revenue loss are cybercriminals’ goals when it comes to online brand spoofing, but a side eff… Read More >

Renatta Siewert

by Renatta Siewert

Senior Security Writer

Posted Aug 17, 2020

Brand Protection
How Your Brand May Be Exploited Without Your Knowledge

Organizations may not be aware… Read More >

Organizations may not be aware of all the ways that bad actors are impersonating their brand online, even though those o… Read More >

Megan Doyle

by Megan Doyle

Contributing Writer

Posted Jul 22, 2020

Brand Protection
Getting to p=Reject, Mimecast’s Internal DMARC Project: Part 1

Creating a DMARC record and setting it to p=Reject would seem to be very easy. It can be &… Read More >

Creating a DMARC record and setting it to p=Reject would seem to be very easy. It can be – but there are several considerations, such as learning who your “good email spoofers” are and how to keep their delivery high, while stopping “bad spoofers” from damaging your goo… Read More >

Matthew Gardiner

by Matthew Gardiner

Principal Security Strategist

Posted Jul 16, 2020

Brand Protection
On Your DMARC: Protecting MS 365 Email Users from Phishing Scams

DMARC is a very effective way to protect Microsoft 365 users from phishing and other email… Read More >

DMARC is a very effective way to protect Microsoft 365 users from phishing and other email-based scams. However, the protocol can be difficult to implement; third-party tools can help. Key Points: Email is easy to spoof and MS 365’s enormous customer base makes it an inviting target for scamm… Read More >

Elliot Kass

by Elliot Kass

Contributing Writer

Posted Jul 02, 2020

Security, Email Security, Brand Protection
Using AI to Fight Domain Spoofing for Online Brand Prot…

As long as it’s easy for… Read More >

As long as it’s easy for bad actors to spoof brand domains and create fake websites, they’ll keep doing it. … Read More >

Megan Doyle

by Megan Doyle

Contributing Writer

Posted Jun 26, 2020

Popular Posts

Older Posts

Security, Email Security, Brand Protection

Why Online Brand Protection Is Important for Small Businesses

Small businesses may think they’re unlikely to suffer from online brand impersonation, but no company is immune to the threat. Key Points: Online brand impersonation is a widespread problem that can damage a company’s reputation and caus…

Read More >

Security, Email Security, Brand Protection

Why DMARC is Essential for Online Brand Protection

DMARC helps stop bad actors delivering malicious emails that appear to come from your brand’s domain. It helps ensure every email received by your brand’s customers, employees, or anyone else, is authentic. Key Points: Email is as vulner…

Read More >

Security, Brand Protection

Companies Wake Up to The Value of DMARC for Online Brand Protection

Backed by DMARC and State of Email Security 2020 data, soaring uptake of DMARC worldwide suggests that organizations are recognizing the value of the standard to combat brand impersonation in phishing emails. Key Points: The number of domains using …

Read More >

Security, Brand Protection

Understanding Online Brand Exploitation and Its Consequences

Online brand exploitation is a very real—and complex—cybersecurity issue. A multi-faceted online brand protection strategy can help brands protect themselves and their customers. Key Points: Brand exploitation is a highly complex—a…

Read More >

categories

Read More >

Mehr

Popular Posts