skip to Main Content

The questions that we will need to answer before we start the project of – building a defense system that will protect us from Spoof mail attacks | Part 7#9

The planning stage of the “defense system” that protects our mail infrastructure, and our users from Spoof mail attack, need to begin with a definition of some framework. This framework will serve as a “logical container,” that defines the particular…

Read more

How does sender verification work? (How we identify Spoof mail) | The five hero’s SPF, DKIM DMARC, Exchange and Exchange Online protection | Part 9#9

The process of “sender verification”, enables us to distinguish between a legitimate sender vs. an attacker who spoofs his identity and prevent a possible Spoof mail attack. In the current article, we will review in details three sender verification standard…

Read more