The Red Sift Blog
Filter all blogs
All blogs
Beyond DMARC: How Red Sift OnDMARC supports comprehensive DNS hygiene
Registrable domains and DNS play a crucial role in establishing online identity and trust, but their importance is often taken for granted. During new service setups, record updates are often overlooked, accumulating outdated entries. As infrastructure teams become increasingly overstretched, services may be incorrectly shut down without proper cleanup, leaving behind a sprawl of…
Read moreFirst look at DKIM2: The next generation of DKIM
In 2011, the original DomainKeys Identified Mail (DKIM1) standard was published. It outlined a method allowing a domain to sign emails, enabling recipients to verify that the email originated from an entity holding a private key that matches the public key published in the domain’s DNS records. Now in 2024, DKIM is ready for…
Read moreSecuring our world: For a safer internet
October is Cybersecurity Awareness Month, a time for industries to unite in promoting digital security within today’s complex landscape. Bad actors are leveraging increasingly sophisticated methods—such as email phishing and Business Email Compromise (BEC)—to exploit vulnerabilities, impersonate legitimate contacts, and access sensitive information. CISA Director Jen Easterly advises us to “always think before you…
Read moreBoosting email security amid recent Coinbase phishing attempts
In recent weeks, there have been reports of sophisticated phishing attacks disguised as official communication from the cryptocurrency platform, Coinbase. These phishing emails closely mimic Coinbase’s branding and language to build recipient trust and prompt clicks on malicious links. The subject lines of these emails generally follow a format: the sender’s address starts with…
Read moreRed Sift’s Fall 2024 Quarterly Product Release
Building on the momentum of our Summer Release, we’ve taken another big step forward in AI-driven security with our Fall 2024 updates. Over the last few months, we’ve been focused on developing our skilled up large language model (LLM), Red Sift Radar – now fully integrated with OnDMARC – making it the first LLM…
Read moreStrengthening U.S. political campaigns against cyber threats: The urgent need for DMARC…
Securing political campaigns from cyber threats has never been more urgent. It is critical to secure communications that handle sensitive exchanges with voters, contributors, donations and coordinate complex operations. Campaigns make exceptionally rich targets for cyber espionage and exploitation, with our open-source research, demonstrating nearly 75% of US Senate campaign websites having not achieved…
Read moreApple & Chrome propose reduced certificate lifetime
The lifetime of SSL/ TLS certificates continues to grow shorter. Chrome initially proposed reducing certificate lifespans to 90 days to enhance security and mitigate risks associated with compromised certificates. Apple took this initiative further, proposing a draft ballot to shorten the maximum validity period for public SSL/TLS certificates to just 45 days by 2027.…
Read moreSkill up your security: How defenders can harness AI
How can defenders identify and resolve security issues faster with Red Sift Radar, and what does it have to do with the movie Tenet? That was the key theme of this year’s 16th e-Crimes & Cybersecurity Mid-Year Summit education session, featuring Billy McDiarmid. If you missed the event, don’t worry—we’ve got you covered with…
Read moreBehind the Screens: North Korea’s Focus on DMARC in Email Espionage
If you missed our recent virtual fireside chat “Behind the Screens: North Korea’s Focus on DMARC in Email Espionage,” or couldn’t attend due to geographical restrictions, we’ve got you covered. Joined by cybersecurity experts from the Federal Bureau of Investigation (FBI) and Stanford University, together with Red Sift, the session explored how the North…
Read moreGmail announces Common Mark Certificates (CMCs) support for BIMI adoption
Co-authored in partnership with Entrust. Gmail has officially announced its support for Common Mark Certificates (CMCs), enabling organizations to utilize BIMI (Brand Indicators for Message Identification) in Gmail without requiring a registered trademark. This means businesses that have established use of a logo but haven’t gone through the registered trademark process can now incorporate…
Read moreRed Sift OnDMARC Recognized as “Leading B2B Tech Software” Provider by Expert…
Red Sift is delighted to once again be recognized as a prestigious “Top Solution” award from Expert Insights, a B2B tech research platform. This coveted award underscores Red Sift’s unwavering commitment to delivering top-notch cloud solutions – and recognized in two categories: Red Sift OnDMARC is an award-winning, cloud-based DMARC, DKIM and SPF configuration…
Read morePowering Up Cybersecurity: Red Sift Partners with Pax8 to Equip MSPs with…
We’re excited to share that Red Sift has officially teamed up with Pax8, one of the leading cloud commerce marketplaces, to make our cybersecurity solutions more accessible to Managed Service Providers (MSPs) globally. This new partnership means that MSPs can now easily access and deploy Red Sift’s solutions—like OnDMARC, Certificates, and Brand Trust—directly through…
Read more4 key takeaways from Red Sift Radar’s live briefing
If you missed the introduction of our latest innovation, Red Sift Radar, don’t worry – we’ve got you covered! Here are the 5 key takeaways from our launch webinar with Red Sift’s CEO Rahul Powar, Senior Director of Sales Engineering Billy McDiarmid and Zachary Bennett, IT & Security Manager at FHC. Watch the live…
Read moreRevolutionizing Cybersecurity: How Abusix and Red Sift Are Taking Automation and Proactive…
As the emergence of new technologies continues to expand, so too does the threat of cyber abuse, an ever persistent and growing challenge for organizations worldwide. Addressing these threats head on requires not just vigilance, but innovation and collaboration. In a new partnership, Abusix, an innovator in internet abuse prevention, and Red Sift, known…
Read moreLarge Language Models: Harnessing Power with Prudence
Large language models (LLMs) have become a global phenomenon, revolutionizing the field of artificial intelligence. These powerful tools have unlocked new possibilities in a range of applications, from natural language processing and automated content generation to advanced data analytics, addressing challenges that were once deemed too complex or unfeasible. However, their widespread popularity and…
Read moreMeet Red Sift Radar: The Skilled Up LLM That Finds and Fixes…
After months of beta testing and feedback, we are excited to announce that Red Sift Radar, our skilled up LLM offering seamless integration with Red Sift OnDMARC, is now commercially available. With Red Sift Radar, security teams can detect exposures, prevent configuration drift, and classify assets or suspicious activity without adding additional headcount. By…
Read moreG2 Fall 2024 Report: Red Sift OnDMARC Wins Big
We’re delighted to share that Red Sift OnDMARC’s winning streak continues. This Fall, we’ve once again been named a Leader in G2’s DMARC category, achieving recognition in both the overall Leader category and Europe for the first time. This recognition is based on our high Customer Satisfaction scores and strong market presence. Red Sift…
Read moreResilience Rising | Episode 3 with Kevin White
In this episode of Resilience Rising, Sean Costigan, Managing Director of Resilience Strategy at Red Sift, and Kevin White, Senior Operation Consultant with Enhanced Information Solutions, explore the critical intersection of wastewater management and cybersecurity. The two highlight the health and operational impacts of cyber threats on water utilities, emphasizing the vulnerabilities due to…
Read moreYour guide to PCI DSS 4.0 Cryptographic Requirements
The Payment Card Industry Data Security Standard (PCI DSS) is a globally recognized framework designed to protect cardholder data during processing, storage, and transmission by merchants and service providers. PCI DSS outlines a set of stringent security controls that organizations handling payment card information must implement to mitigate the risk of data breaches and…
Read moreHow to build an inventory of certificates for PCI DSS 4.0 Requirement…
We talk to organizations daily that are preparing for PCI DSS 4.0 requirements. March 31, 2025 marks the end of the transition period, and on this date, businesses must be fully compliant with PCI DSS v4.0.1. One of the ways PCI 4.0.1 varies from PCI 3.2 is an updated Requirement 4, which covers encrypting…
Read more