Featured Blog
Understanding Email Authentication Protocols: A Technical Overview of SPF, DKIM and DMARC With Configuration Tips
Historically, email was a bit of a free-for-all where mail servers blindly accepted any email that was received. Obviously, this has changed in the last 15 years with the proliferation of spam and virus filters, also known as mail filters or “milters” for short. These filters look at the content of an email or the […]
Breaches, Cyberattacks, IT, Retail
What Happens to All the Credit Card Numbers Stolen in Data Breaches?
Breaches, Cyberattacks, Government, Health care
State Targets: 5 Major Data Breaches in October 2014
Breaches, Cyberattacks, Events, Financial Sector, Malware, Retail, Vulnerabilities