Today we’re talking about cybersecurity frameworks.
We recently discussed SPF and DKIM. Today I’m completing the email authentication hat trick with DMARC. A lot of companies don’t realize that their emails are ending up in the recipient’s spam folder because they haven’t correctly configured SPF, DKIM, and DMARC.
Yesterday I discussed about how SPF, the Sender Policy Framework, helps reduce spam and email impersonation, and helps get legitimate email delivered. Today I’m going to talk about another way email can be authenticated at the domain level, DomainKeys Identified Mail or DKIM for short.
Reducing spam, phishing, and email impersonation have never been more important. If you get your email configuration right, you can help in this fight. But if you don’t, you may inadvertently route legitimate emails that you or your organization send directly into quarantines and spam folders. Today I’m going to talk about one of the tools at our disposal, the Sender Policy Framework.
Today I’m responding to a frequent question from people who would like to enter or progress in a cybersecurity career: Should I learn to write code?
Two days ago, I introduced the basics of machine learning, and yesterday I outlined how social media sites can use and abuse machine learning. Today I’d like to specifically address election manipulation.
Yesterday we talked about machine learning basics, and today we’ll discuss the use of machine learning in social media.
Every time you turn around there’s yet another company talking about machine learning. In some cases, it’s pure hype. But for some applications, machine learning is the way of the future, and along with it come significant privacy, security, and policy implications.
Today on the fifth day of Vlogmas, here are my top 5 personal cybersecurity tips.
Today I’m going to be short and to the point. There’s a lot of debate about the origin of this quote, but I like it: “Insanity is doing the same thing over and over again and expecting different results.” Stop the insanity. If you’re not using multi-factor authentication, commonly referred to as MFA, you need to start now.