Join Red Sift and SecurityScorecard at Black Hat 2022 Las Vegas

I’m thrilled to share that Chuck Swenberg and I will be attending Black Hat USA this year from August 8th – 12th in Las Vegas. As one of the largest events in the industry, convening thousands of cybersecurity innovators and experts worldwide, we can’t think of a better opportunity to educate, meet, and learn from our peers…and in person, no less!  

The state of today’s email attacks

Join me for a series of talks on Wednesday and Thursday that I’ll be presenting in partnership with SecurityScorecard, where I’ll be discussing the state of today’s email attacks and how companies can best secure their domains. 

During the session you’ll learn about:

Expert one-on-one advice 

You can also find Chuck Swenberg at the SecurityScorecard booth #960. At the booth, Chuck will be available for meetings with customers, partners, analysts, and prospects, to discuss Red Sift’s latest integrated offerings, and share expert advice one-on-one. And both Chuck and I will be available during the rest of the conference as well if you’d like to meet with us. 

We’re excited for a very special Black Hat event and look forward to seeing you all there! 

Find out more


Brian Westnedge

3 Aug. 2022



Recent Posts


Preventing certificate related violations in cybersecurity frameworks:  A guide to certificate monitoring…

Rebecca Warren

TLS is one of the most widely adopted security protocols in the world allowing for unprecedented levels of commerce across the internet.  At the core of the TLS protocol is TLS certificates. Organizations must deploy TLS certificates and corresponding private keys to their systems to provide them with unique identities that can be reliably…

Read more

Red Sift ASM & Red Sift Certificates: the missing link in your…

Billy McDiarmid

According to Gartner, Attack Surface Management (ASM) refers to the “processes, technology and managed services deployed to discover internet-facing enterprise assets and systems and associated exposures which include misconfigured public cloud services and servers.” This broad category of tooling is used within Continuous Threat Exposure Management (CTEM) programs, with many vendors within it having…

Read more

The best tools to protect yourself from SubdoMailing

Francesca Rünger-Field

In late February 2024, ‘SubdoMailing’ became a trending search term overnight. Research by Guardio Labs uncovered a massive-scale phishing campaign that had been going on since at least 2022. At the time of reporting, the campaign had sent 5 million emails a day from more than 8,000 compromised domains and 13,000 subdomains with several…

Read more
Product Release

Red Sift’s Spring 2024 Quarterly Product Release

Francesca Rünger-Field

This early into 2024, the cybersecurity space is already buzzing with activity. Emerging standards, such as Google and Yahoo’s bulk sender requirements, mark a new era of compliance for businesses reliant on email communication. At the same time, the prevalence of sophisticated cyber threats, such as the SubdoMailing campaign, emphasizes the continual hurdles posed…

Read more