Tag: dkim

API Enhancements for DKIM Automation

December 2, 2020

DKIM, Domain Keys identified Mail, is a critical component to ensuring good INBOX delivery of email messages for day-to-day email, email marketing, and transactional email.  DKIM digitally signs outbound email so that the message recipients can verify that the messages originated from email servers authorized to send email from the sender.  I.e., it helps recipients […]

Save Yourself From “Yourself”: Stop Spam From Your Own Address

September 22, 2017

I just got junk email … from me! It is surprisingly common for users to receive Spam email messages that appear to come from their own address (i.e. “joe@domain.com” gets a Spam email addressed so it appears to be from “joe@domain.com”).  We discussed this issue tangentially in a previous posting: Bounce Back & BackScatter Spam […]

ARC and SMTP MTA-STS: The State of Domain-based Email Authentication – Part 3

September 19, 2017

We’ll close (for now) our three part series on the state of domain-based authentication for emails by completing the story on technologies being deployed or defined to improve the security of the email ecosystem. In Part 1, we wrote about using Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) to authenticate the sending mail […]

DMARC: The State of Domain-based Email Authentication – Part 2

September 11, 2017

Building a safer email ecosystem with DMARC In our previous post, we described two techniques for authenticating an email sender: Sender Policy Framework (SPF), IETF RFC 7208, which verifies if the sending MTA is indeed authorized to send mail on behalf of a domain; and DomainKeys Identified Mail (DKIM), IETF RFC 6376, where a domain shows “ownership” of a mail […]

Self-Addressed Spoofed Email: How to Shut Down Spam

May 11, 2017

Spam messages coming from… your own email? This may sound like a cheesy movie plot, but this form of spam, known as “spoofing,” can have horrifying consequences if they result in compromised security, stolen data, or malware on your company’s machines. Read on to find out how to snuff out spoofing and help everyone avoid […]