Email authentication isn’t just an IT concern. It protects your brand and customers. A single misstep can let attackers spoof your domain, send phishing emails, and destroy customer trust. One of the most dangerous methods? The DKIM replay attack. In this post, we’ll break down how undersigned DKIM keys and related misconfigurations open your domain…Continue Reading: The hidden threat: How misconfigured DKIM enables replay attacks
Cybersecurity
Why DMARC matters: Protect your organization from evolving phishing threats
Phishing campaigns continue to change. Attackers are adapting faster than traditional security tools, using more subtle methods to bypass filters and reach inboxes. The latest KnowBe 4 Phishing Threat Trends Report (2025) shows a steady increase in attacks that slip through email security platforms and a growing use of techniques that avoid detection, increasing 173%…Continue Reading: Why DMARC matters: Protect your organization from evolving phishing threats
Collaborative cybersecurity: The building blocks to a safer internet
Ciaran Martin, former CEO of the UK National Cyber Security Centre, and Rahul Powar, CEO of Red Sift Executive Summary: As technology advances, so do associated risks. A conversation between industry leaders emphasizes that collaborative cybersecurity efforts are crucial to building a safer and more resilient internet. This article: Introduction The internet’s foundational promise is one…Continue Reading: Collaborative cybersecurity: The building blocks to a safer internet
Securing crypto with Andrei Terentiev
Executive Summary: In an insightful discussion, Bitcoin.com’s CTO, Andrei Terentiev, delves into the challenges at the intersection of cryptocurrency and cybersecurity, offering strategies to protect digital assets in an ever-evolving landscape. This article: Introduction In a new episode of Resilience Rising, host Sean Costigan speaks to Andrei Terentiev, Chief Technology Officer (CTO) of Bitcoin.com. The discussion…Continue Reading: Securing crypto with Andrei Terentiev
Moving cybersecurity upstream to achieve resilience
Executive Summary: Integrating cybersecurity measures from the outset of software development is essential. Experts agree that this proactive approach enhances organizational resilience against cyber threats. This article: Introduction The traditional approach to cybersecurity—often tacked on as an afterthought—needs a serious overhaul. This was the consensus in the recent MN-ISSA sponsored fireside chat titled “Moving Cybersecurity Upstream…Continue Reading: Moving cybersecurity upstream to achieve resilience
Predictions for 2025: Cybersecurity and the increasing rise of AI
Executive Summary: The year 2025 is set to witness a profound integration of AI into business functions, transforming cybersecurity into a pivotal business enabler. Organizations that adapt to these trends will gain a significant technological and competitive advantage. This article: Introduction 2025 is set to be the year where cybersecurity and AI will be defined by…Continue Reading: Predictions for 2025: Cybersecurity and the increasing rise of AI