phishing Industry NewsTechnical Documentation

Three Steps for Basic BEC Defense

Weaponized fake emails are fooling businesses around the globe. When combined with easy access to information from business-facing social networks, BEC attacks now indiscriminately target everyone—from the smallest shops to the largest organizations in the world. The following three steps will put basic BEC defense in place at your organization:Use DMARC to get visibility into the scope of your potential BEC problem. DMARC will show you which servers around the Internet are sending email using your email domains—even the bad…
John Bowers
7 October 2019
dmarcian Detail Viewer dmarcian ToolsIndustry NewsTechnical Documentation

Detail Viewer Upgrades: Report Processing Optimization and DKIM Selector Visibility

We're incredibly excited to share recent improvements to one of the most heavily used elements of our application—the Detail Viewer. All of us at dmarcian are certain that you will find these updates to be useful throughout the process of DMARC deployment and management. We’ve added some performance enhancements to the data-analysis stage of report processing that has drastically reduced the time it takes for reports to generate. We find this especially impactful when generating reports with large datasets, filtering…
John Bowers
5 October 2019
Technical DocumentationVideos

Videos on all things DMARC

We're very pleased to feature a series of short, technical videos that walk through various aspects of DMARC.  These videos draw upon the best of our training courses, are freely available and can be viewed at your leisure. These videos stand by themselves and should be accessible even to the less technically inclined among us. If you've got an hour and you'd like to become an expert in DMARC, view them in order and then let us know how you…
7 August 2019
dmarcian ToolsTechnical Documentation


Once you’ve published DMARC records, DMARC data will typically begin to generate within a day or two in the form of reports that give you insight into the way your domains are handling email.  There are two forms of reports: RUA reports that provides an aggregate view of all of a domain’s traffic, and RUF reports that are redacted forensic copies of the individual emails that are not 100% compliant with DMARC. While RUA reports show the traffic of the…
Vaughn Talbert
25 June 2019
dmarcian ToolsTechnical Documentation

Are your Google Calendar Invite Responses Blocked by DMARC?

We have previously discussed the issue of Google Calendar invites (and other Google Suite services) being broken from the perspective of a G Suite owner. But there is also an issue for receivers who interact with Google's email body invite links, as Google spoofs the invitee's domain to generate a notification. If the invitee’s domain is at p=reject, this can occasionally send back a bounce to the invitee, making it confusing for everyone.You may see Google as a source in…
Vaughn Talbert
25 June 2019
Industry NewsTechnical Documentation

The Importance of Sources in DMARC

A “source” is what we call any company that offers its clients the ability to send emails with their own domain. This translates to any infrastructure that’s capable of “sending emails on behalf of others.” Bearing this explanation in mind, we can identify several types of sources, the most notable are: ESPs - offer their clients the ability to send bulk (marketing and/or transactional) emails with their own domain ISPs - offer the ability to receive and send emails with…
Vaughn Talbert
23 May 2019