Infosecurity Europe 2019: A-listers still failing to protect their domains

The elaborate stands have been dismantled, the armies of exhibitors have headed back to their respective offices and homes, and we can all breathe a sigh of ‘thank-goodness-it’s-over-for-another-year’ relief. But we’re left dumbfounded, yet again, that so many shining stars of the cybersec industry are stumped by DMARC implementation.

Let’s cut to the chase – last year, we decided to analyse the primary domains of the organisations exhibiting at 2018 Infosecurity Europe. This show hosts the crème de la crème of the cybersecurity industry, beacons of hope against the onslaught of data-thieving cyber attacks (bear with the hyperbole, I’m trying to make a point..) so we weren’t expecting the inadequate results that we uncovered.

In 2018, only 9% of those vendors claiming to solve your cybersecurity woes and offering the best of class protection on the market, had protected their own domains with DMARC at a level sufficient to stop phishing attacks at the gateway or sweep to the spam folder. And just to remind you, DMARC is the only surefire way to stamp out email impersonation – email impersonation which enables scammers to send you phishing emails – phishing emails that can dupe you into handing over data, money, confidential details about your SoC… just saying.

But wait, there is good news! We ran the research again this year, and can reveal an improvement – disappointingly, it was a very small increase, just 13% of 2019’s exhibitors had DMARC set at the p=quarantine or p=reject levels.

So, what does this research tell us, apart from the industry is painfully slow at responding to ratified global protocols?

  • DMARC is available to anyone – so if the industry pioneers aren’t implementing it, either hubris is setting in, or it’s proving more complicated than expected to configure it correctly
  • We shouldn’t trust security vendors because they say they’re cybersec geniuses – if they can’t protect their own, known domains, how can they protect your unknown digital infrastructure?
  • DMARC alone can’t protect your networks from intrusion or scammers exploiting vulnerabilities, but it is one of the layers of protection required to prevent phishing attacks – one of the biggest threats to any organisation in today’s age of digital comms.

If you are looking for support with DMARC deployment or simply want to find out more information about how to stop email spoofing, make sure you sign up to our OnDMARC trial for free!

PUBLISHED BY

Red Sift

12 Jun. 2019

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
News

Red Sift now offered through GuidePoint Security in new partnership

Rahul Powar

Organizations seeking to elevate their cybersecurity posture can now benefit from Red Sift’s advanced innovations, supported by GuidePoint Security’s expertise in aligning the right solutions to each customer’s needs. BOSTON & LONDON, 08:00 ET/ 13:00 BST, 10 September 2025 – Red Sift today announced a strategic reseller partnership with GuidePoint Security, the leading U.S.…

Read more
Awards

From Europe to Asia Pacific: OnDMARC earns global recognition in G2’s Fall…

Francesca Rünger-Field

G2’s Fall 2025 Report is out, and Red Sift OnDMARC continues to earn recognition across the globe. This quarter, we were featured in 19 reports, including a new appearance in the Asia Pacific Regional Grid® Report for DMARC, reinforcing our position as a trusted solution for securing email and protecting brands worldwide. We also…

Read more
AI

AI supercharges airline phishing: Why email security must catch up

Rahul Powar

Executive summary: Only 1 in 5 airlines enforces DMARC at the highest level, leaving customers exposed to phishing attacks that are now supercharged by AI. With billions at stake and national security on the line, airlines must move fast by adopting strong email authentication, deploying AI to counter AI, and leading by example across…

Read more
DMARC

74% of US credit unions vulnerable to email spoofing: Is your organization…

Stuart Rogers

Email remains a heavy lifter for credit unions, whether it’s member notices, statements, loan workflows, or vendor coordination. That’s exactly why impersonation keeps paying, with the National Credit Union Association (NCUA) warning that all credit unions and vendors are active targets for phishing and social engineering, and urges rapid incident reporting when attacks hit.…

Read more