Award: Red Sift wins at Computing Security Excellence Awards 2020

Red Sift were honoured to be winners of “Security Vendor of the Year – SME” at this year’s Computing Security Excellence Awards.

SMEs are often forced to make do with ageing infrastructure and legacy systems, and may be unable to defend themselves against new threats. The prize was awarded to the company who can best aid SMEs in their constant battle to avoid becoming the ‘low-hanging fruit’ of cybersecurity.

“Red Sift presented an easy to understand proposition applicable to almost every SME, with a good structured submission and strong case studies that showed clear evidence of success.”

We believe the award is testament to our own company ambitions to democratize technology essential for cybersecurity and look forward to continuing to support other SME’s in the near future.

PUBLISHED BY

Harry Stephens

11 Dec. 2020

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
DMARC

Beyond DMARC: How Red Sift OnDMARC supports comprehensive DNS hygiene

Red Sift

Registrable domains and DNS play a crucial role in establishing online identity and trust, but their importance is often taken for granted. During new service setups, record updates are often overlooked, accumulating outdated entries. As infrastructure teams become increasingly overstretched,  services may be incorrectly shut down without proper cleanup, leaving behind a sprawl of…

Read more
DKIM

First look at DKIM2: The next generation of DKIM

Red Sift

In 2011, the original DomainKeys Identified Mail (DKIM1) standard was published. It outlined a method allowing a domain to sign emails, enabling recipients to verify that the email originated from an entity holding a private key that matches the public key published in the domain’s DNS records. Now in 2024, DKIM is ready for…

Read more
Security

Securing our world: For a safer internet

Jack Lilley

October is Cybersecurity Awareness Month, a time for industries to unite in promoting digital security within today’s complex landscape. Bad actors are leveraging increasingly sophisticated methods—such as email phishing and Business Email Compromise (BEC)—to exploit vulnerabilities, impersonate legitimate contacts, and access sensitive information. CISA Director Jen Easterly advises us to “always think before you…

Read more
Cybersecurity

Boosting email security amid recent Coinbase phishing attempts

Jack Lilley

In recent weeks, there have been reports of sophisticated phishing attacks disguised as official communication from the cryptocurrency platform, Coinbase. These phishing emails closely mimic Coinbase’s branding and language to build recipient trust and prompt clicks on malicious links. The subject lines of these emails generally follow a format: the sender’s address starts with…

Read more