As a security expert, you have a great deal of responsibility and also have your hands full. With our Winter School we offer in entertaining special trainings with many practical examples, for the necessary knowledge. The aim of our security training courses is to give you an understanding of the special IT security topics. Register now and save your place. Register now and save your place.
In the fifth part of our series on sender reputation, we explain how you can use DNS-based Authentication of Named Entities (DANE) to ensure the authenticity of certificates and protect your email traffic from access by criminals.
In the fourth part of our series of articles on sender reputation, we show you how you can use Domain-based Message Authentication, Reporting and Conformance (DMARC) to determine how the receiving server should authenticate your emails and what it should do if authentication fails. In addition, we explain how you can use DMARC to quickly be informed about abuse of your domain and thus protect the reputation of your domain.
Short URL services such as bit.ly are consistently used by criminals to get phishing links past email security solutions and onto their victims’ computers. In this article, we show you how short URLs are used as part of spam campaigns and why Heimdall and its dedicated web crawler offer ideal protection against attacks.
Ensuring the authenticity of senders is therefore a crucial step in ensuring the security of your IT infrastructure. In part 3 of our series of articles on sender reputation, we show you how you can use DomainKeys Identified Mail (DKIM) to check the domain information of sender addresses and prevent spam and phishing attacks.
Every quarter, our Heimdall research team provides new insights into the current threat situation in the field of email security. The findings, assessments and concrete recommendations are of high value for all email administrators and other persons responsible for IT security – regardless of whether NoSpamProxy is used as a product or not.
A joint offer from Bechtle and Net at Work supports hospitals from the application for funds to the ongoing operation. Net at Work grants all hospitals special conditions for public clients for procurements supported by KHZG funds, regardless of legal form and sponsorship.
SPF, DKIM, DMARC and ARC are essential technologies for the detection of fake sender domains as well as for the defence against phishing attacks. Part 2 of our series of articles on sender reputation focuses on a method to authorise specific IP addresses to send emails: Sender Policy Framework (SPF) is a simple and effective method to prevent the misuse of sender domains.