<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=62700&amp;fmt=gif">

Breaking DKIM? Or Simply Misunderstanding How It Works In Practice

A recent post by German software developer and security researcher Steffen Ulrich claims that it’s possible to create emails that pass both DKIM and DMARC validation, but which show malicious...

DMARC Failure Reports: What Are They Good For? (Absolutely Nothing!)

DMARC is a powerful tool that domain owners can use to protect their domains — and thus their brands — from abuse. At enforcement (a policy of “quarantine” or “reject”) it stops impersonation...

The Only Email Authentication Solution Trusted by Both Hooli and Pied Piper

HBO’s Silicon Valley, which just finished its fourth season, tells the story of Pied Piper — an early stage data compression startup — and its rivalry with the tech giant Hooli. Over the course of...

How DMARC Handles Domains and Subdomains in Email Addresses (Part 1)

Photo credit: Profound Whatever/Flickr via photopin.com

DMARC uses the Domain Name System (DNS) to store records indicating how email receivers should evaluate incoming messages for...

DMARC: The Only 3 Tags You Really Need

These are not the tags you’re looking for. Photo credit: Lisa Brewster/Flickr

The DMARC standard defines a number of different tags that can be used in a DMARC record. Some of these tags are...


The ValiMail Blog: Return to Sender

Everything you ever wanted to know (but were afraid to ask) about email authentication DMARC, SPF, DKIM, and how they can stop fraud and phishing.

More information

Subscribe to Email Updates