“What’s Next for DMARC”: Red Sift & Inbox Monster Webinar Recap

The recent webinar hosted by Inbox Monster, “What’s Next for DMARC: Data & Predictions for a New Era in Email Authentication,” featured insights from Red Sift and examined the significant changes brought by Yahoo and Google’s bulk sender requirements earlier this year.  It also offered a forward-looking perspective on the future of email authentication.

Watch the webinar below or keep scrolling for the written recap.

Navigating Google and Yahoo’s Updates and How to Stay Ahead

When Yahoo and Google announced they were updating their email authentication requirements for bulk senders in October 2023, businesses around the world came under pressure to comply in order to ensure their emails continued reaching customer inboxes.. Dive into the webinar highlights and learn how these new requirements have been shaping the world of authentication and what you can do if you still have not met the new standards. 

DMARC: Current Adoption and Future Trends

Recent data on DMARC adoption reveals increasing recognition of DMARC’s role in preventing email spoofing and phishing attacks. Implementing DMARC allows businesses to authenticate their emails, ensuring recipients can trust their communications.  As more organizations adopt stricter DMARC policies, we can expect a significant reduction in email-based threats. Additionally, advancements in email authentication technology could further enhance security and reliability.

Experts Faisal Misle of Red Sift and Pilar Bower of Inbox Monster discussed how different industries are progressing in their DMARC adoption journeys and what this means for overall email security.

Enhancing Brand Visibility with BIMI

Another key topic was the implementation of BIMI, which allows businesses to display their logos in supported email clients, improving brand visibility and enhancing trust among email recipients. Despite the adoption of BIMI being slow due to its complex setup and the VMC requirement, the long-term benefits of BIMI prove to better brand recognition for organizations.

If you’d like to find out if you could get BIMI, use Red Sift’s free BIMI Checker to verify if you have the right email security setup in place. By inspecting your public-facing DMARC policy, Red Sift can check what stage you’re at in your DMARC & BIMI journey, and provide detailed guidance on how to get BIMI-ready.

The Role of ARC in Email Forwarding

Forwarded emails often lose their authentication status, leading to potential security risks. ARC addresses this issue by creating a chain of custody for email messages, ensuring that each step in the forwarding process is authenticated. The webinar highlighted the importance of ARC in maintaining the integrity of forwarded emails, especially in complex email routing scenarios.

Actionable Steps and Best Practices

The Inbox Monster and Red Sift teams discussed how businesses who are looking to enhance their email security should implement a strict DMARC policy, ensure the correct setup of SPF and DKIM, and leverage BIMI to improve brand recognition.

As email security continues to evolve, it is important for businesses to take proactive measures to prevent email-based threats and build trust with recipients. 

PUBLISHED BY

Red Sift

25 Jul. 2024

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Certificates

TLS certificates are changing: What you need to know

Red Sift

Executive summary: TLS certificates are about to get significantly shorter-lived. Starting 15 March 2026, newly issued public-trust certificates will max out at 200 days—and just three years later, that lifespan drops to 47 days. Backed by Google, Apple, and Mozilla, this shift aims to make the web safer through fresher data, faster failover, and…

Read more
DKIM

The hidden threat: How misconfigured DKIM enables replay attacks

Red Sift

Email authentication isn’t just an IT concern. It protects your brand and customers. A single misstep can let attackers spoof your domain, send phishing emails, and destroy customer trust. One of the most dangerous methods? The DKIM replay attack. In this post, we’ll break down how undersigned DKIM keys and related misconfigurations open your…

Read more
BIMI

Why DMARC and BIMI are a business priority

Jack Lilley

Email threats aren’t slowing down, and neither should your authentication strategy. In our recent joint webinar with Marigold, “From DMARC to BIMI: Navigating the New Email Authorization Landscape,” we broke down what today’s evolving standards mean for both security and marketing teams—and how to take action now with our free Red Sift Investigate tool.…

Read more
ASM

Zoom stops zooming: Why active monitoring is essential

Billy McDiarmid

​On April 16, 2025, Zoom experienced a significant global outage that disrupted video conferencing services and access to its website for thousands of users, as well as their corporate email for all their employees. It was quickly identified as a domain name registration status problem. Despite being a critical name for Zoom, somehow, the…

Read more