Cybersecurity

New in Certificates Lite: Active certificate scanning and smarter expiry alerts

A quick recap Earlier this year, we launched Red Sift Certificates Lite, the free TLS certificate expiration monitoring service recommended by Let’s Encrypt. Since launch, thousands of organizations have adopted it to track their certificates and avoid expiry-related outages. What we heard from customers At launch, we had adopted Let’s Encrypt’s approach for consistency with…Continue Reading: New in Certificates Lite: Active certificate scanning and smarter expiry alerts

Red Sift now offered through GuidePoint Security in new partnership

Organizations seeking to elevate their cybersecurity posture can now benefit from Red Sift’s advanced innovations, supported by GuidePoint Security’s expertise in aligning the right solutions to each customer’s needs. BOSTON & LONDON, 08:00 ET/ 13:00 BST, 10 September 2025 – Red Sift today announced a strategic reseller partnership with GuidePoint Security, the leading U.S. cybersecurity…Continue Reading: Red Sift now offered through GuidePoint Security in new partnership

What is social engineering and how can you prevent it?

Executive summary: Email phishing has evolved and criminals now use social engineering to impersonate executives, suppliers, and even government agencies, persuading recipients to approve payments or disclose credentials. Because human judgment sits at the heart of these attacks, technical controls that eliminate spoofed messages before they reach the inbox are essential. DMARC provides that control…Continue Reading: What is social engineering and how can you prevent it?

How the EU can mandate stronger email security

Executive summary: The article examines how the EU can proactively close email security gaps by leveraging the NIS2 Directive to mandate robust, harmonized standards like DMARC, DKIM, and SPF across all member states. By acting now, the EU not only protects its digital ecosystem but also sets a global benchmark for cybersecurity best practices. Key…Continue Reading: How the EU can mandate stronger email security

The future of email security: Innovations, challenges, and the role of DMARC

Executive summary: Email remains a critical tool for business and personal communication, but it is also a primary target for cyber threats such as phishing, spoofing, and Business Email Compromise. As attackers become more sophisticated, organizations must adopt advanced security measures like DMARC and stay informed about emerging authentication protocols. Industry collaboration and proactive adoption…Continue Reading: The future of email security: Innovations, challenges, and the role of DMARC

The hidden threat: How misconfigured DKIM enables replay attacks

Email authentication isn’t just an IT concern. It protects your brand and customers. A single misstep can let attackers spoof your domain, send phishing emails, and destroy customer trust. One of the most dangerous methods? The DKIM replay attack. In this post, we’ll break down how undersigned DKIM keys (signing too little of the message)…Continue Reading: The hidden threat: How misconfigured DKIM enables replay attacks