“What’s Next for DMARC”: Red Sift & Inbox Monster Webinar Recap

The recent webinar hosted by Inbox Monster, “What’s Next for DMARC: Data & Predictions for a New Era in Email Authentication,” featured insights from Red Sift and examined the significant changes brought by Yahoo and Google’s bulk sender requirements earlier this year.  It also offered a forward-looking perspective on the future of email authentication.

Watch the webinar below or keep scrolling for the written recap.

Navigating Google and Yahoo’s Updates and How to Stay Ahead

When Yahoo and Google announced they were updating their email authentication requirements for bulk senders in October 2023, businesses around the world came under pressure to comply in order to ensure their emails continued reaching customer inboxes.. Dive into the webinar highlights and learn how these new requirements have been shaping the world of authentication and what you can do if you still have not met the new standards. 

DMARC: Current Adoption and Future Trends

Recent data on DMARC adoption reveals increasing recognition of DMARC’s role in preventing email spoofing and phishing attacks. Implementing DMARC allows businesses to authenticate their emails, ensuring recipients can trust their communications.  As more organizations adopt stricter DMARC policies, we can expect a significant reduction in email-based threats. Additionally, advancements in email authentication technology could further enhance security and reliability.

Experts Faisal Misle of Red Sift and Pilar Bower of Inbox Monster discussed how different industries are progressing in their DMARC adoption journeys and what this means for overall email security.

Enhancing Brand Visibility with BIMI

Another key topic was the implementation of BIMI, which allows businesses to display their logos in supported email clients, improving brand visibility and enhancing trust among email recipients. Despite the adoption of BIMI being slow due to its complex setup and the VMC requirement, the long-term benefits of BIMI prove to better brand recognition for organizations.

If you’d like to find out if you could get BIMI, use Red Sift’s free BIMI Checker to verify if you have the right email security setup in place. By inspecting your public-facing DMARC policy, Red Sift can check what stage you’re at in your DMARC & BIMI journey, and provide detailed guidance on how to get BIMI-ready.

The Role of ARC in Email Forwarding

Forwarded emails often lose their authentication status, leading to potential security risks. ARC addresses this issue by creating a chain of custody for email messages, ensuring that each step in the forwarding process is authenticated. The webinar highlighted the importance of ARC in maintaining the integrity of forwarded emails, especially in complex email routing scenarios.

Actionable Steps and Best Practices

The Inbox Monster and Red Sift teams discussed how businesses who are looking to enhance their email security should implement a strict DMARC policy, ensure the correct setup of SPF and DKIM, and leverage BIMI to improve brand recognition.

As email security continues to evolve, it is important for businesses to take proactive measures to prevent email-based threats and build trust with recipients. 

PUBLISHED BY

Red Sift

25 Jul. 2024

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
News

Introducing DNS Guardian: Stop impersonation and spam caused by domain takeovers 

Rahul Powar

tl;dr: We’re thrilled to announce DNS Guardian — a new feature in Red Sift OnDMARC that can swiftly identify and stop domain takeovers that lead to malicious mail. Back in February, we shared updates with the community about SubdoMailing – an attack discovered by Guardio Labs. The attack was a form of subdomain takeover,…

Read more
Cybersecurity

Resilience Rising | Episode 3 with Kevin White

Red Sift

In this episode of Resilience Rising, Sean Costigan, Managing Director of Resilience Strategy at Red Sift, and Kevin White, Senior Operation Consultant with Enhanced Information Solutions, explore the critical intersection of wastewater management and cybersecurity.  The two highlight the health and operational impacts of cyber threats on water utilities, emphasizing the vulnerabilities due to…

Read more
Certificates

Your guide to PCI DSS 4.0 Cryptographic Requirements

Rebecca Warren

The Payment Card Industry Data Security Standard (PCI DSS) is a globally recognized framework designed to protect cardholder data during processing, storage, and transmission by merchants and service providers. PCI DSS outlines a set of stringent security controls that organizations handling payment card information must implement to mitigate the risk of data breaches and…

Read more
Certificates

How to build an inventory of certificates for PCI DSS 4.0 Requirement…

Rebecca Warren

We talk to organizations daily that are preparing for PCI DSS 4.0 requirements. March 31, 2025 marks the end of the transition period, and on this date, businesses must be fully compliant with PCI DSS v4.0.1.  One of the ways PCI 4.0.1 varies from PCI 3.2 is an updated Requirement 4, which covers encrypting…

Read more
DMARC

Getting started with the OnDMARC API

Nadim Lahoud

The OnDMARC API is great for performing bulk or repetitive tasks that need to be performed quickly, often and without error – and you don’t need to be a developer or even know how to code to use it. Here, I will walk you through how to perform the common task of updating the…

Read more