aariya goel's articles

  1. Cybersecurity
We’ve all heard stories of multi-million dollar impersonation scams and of companies losing huge chunks of their data. But have you ever wondered how this happens? What are the nitty-gritty details of such scams and how are they carried out? If you have and never received answers to them, don’t worry! We’ll walk you through […]
  1. Cybersecurity
You’ve likely heard plenty of horror stories about email-based cyberattacks in the past few years. Social engineering has become a rising threat to business email and it’s reported that losses resulting from business email compromise scams totaled $1.2 billion in 2018 alone. Email remains one of the most likely targets of cyberattacks simply because it’s […]
  1. Cybersecurity
You’ve likely heard plenty of horror stories about email-based cyberattacks in the past few years. Social engineering has become a rising threat to business email and it’s reported that losses resulting from business email compromise scams totaled $1.2 billion in 2018 alone. Email remains one of the most likely targets of cyberattacks simply because it’s […]
  1. Cybersecurity
DMARC is an email authentication standard that can help businesses fight the rising threat of brand exploitation, including email phishing attempts and business email compromise attacks. But it’s a complex protocol, the benefits and mechanisms of which are not often well-understood by non-security professionals. Security teams who are able to clearly explain DMARC and its […]
  1. Education
DomainKeys Identified Mail (DKIM) is an anti-tamper protocol that ensures your mail remains secure in transit. DKIM uses digital signatures to check that a specific domain sent an email. DKIM validates your communications in two ways. The first operation occurs on a server that sends DKIM-signed emails, and the second occurs on the receiving server […]
  1. Cybersecurity
The pandemic has prompted a novel shift in work culture, where employees from all parts of the globe transitioned from office working to remote working. What does this mean for companies and major brands? It means that these employees are using their personal devices for work. This BYOD culture, however, introduces its own set of […]
  1. Cybersecurity
DomainKeys Identified Mail (DKIM) is an anti-tamper protocol that secures your emails while in transit. It uses digital signatures to confirm whether the email was sent by an authentic domain. What is DKIM? The first DKIM action occurs on the server that sends a DKIM signed email, while the second takes place on the recipient […]
close

Log In

Or with username:

Forgot password?

Don't have an account? Register

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.

Login