How to Protect Your Brand from Scary Risks Posed by New Domains

There are over 100 million domains ending in “.com.” But now, thanks to a new generic top-level domain (gTLD) program, there are many more options. Companies can replace .com with domain extensions that are more consistent with their industry, like .bank, .realty, or .shop. Some companies have gone one step further and bought their own top-level domain (TLD). For example, Barclays recently... Continue »

Authentication 101 - The Fundamentals

What is authentication? Email authentication is the process by which a sender is validated through published records, such as SPF and DKIM, that they are who they purport to be. After hitting send on an email, the originating server sends the message with identifying information to the recipient’s mail server. This server queries DNS with that information and uses the records provided to validate... Continue »

Fifteen Years is a Long Time to Fly the Same Flag

  Show me a logo that stood for a business for fifteen years and I’ll show you a great company. I’m proud to call Return Path a great company, of course, and I couldn’t be more proud of the way our logo represented us since 2000. Return Path has evolved and grown in ways we couldn’t imagine back then, but always under the same flag.   Today for the first time in our history we’re flying a new... Continue »

Hook, Line & Sinker: Protecting data against malicious phishing attacks

IT security stories are becoming more and more prevalent in the news. We are seeing hacking, data theft and the importance of data protection crowding the news agenda daily. Email marketing remains one of the most valuable internet services however it is extremely vulnerable and therefore prone to malicious attacks.  These attacks that seek to obtain sensitive data can cause major damage to... Continue »

Sony Hack Spotlights Vulnerabilities: A Review of the Threat Landscape

FBI director James Comey recently reaffirmed the agency’s initial position, attributing the late December attacks on Sony Pictures Entertainment to North Korea. Some are already speculating that all out state-sponsored cyber warfare is just around the corner. However, this isn’t the first time Sony’s systems have been compromised, and government elements are rarely identified as instigators of... Continue »