Mail authentication: DKIM protocol

Mail authentication: DKIM protocol

In a previous article, we explained the importance of using an SPF field in the DNS records of the company’s domain name. In addition to the SPF, it is recommended to use the DKIM email authentication protocol to guarantee the identity of the senders when...
Mail authentication: SPF protocol

Mail authentication: SPF protocol

Mail authentication   Despite today’s awareness of email fraud, employees continue to be the primary gateway for malicious software into businesses. These malwares can, among other things, spoof corporate identities to send massive phishing campaigns, block...