Are You Hitting the Mark with DMARC?
As organizations struggle to protect their end-users from email attacks despite pragmatic methods such as phishing and awareness training, there is another tool available to assist in reducing this threat - Domain-based Message Authentication, Reporting, and Conformance (DMARC). Despite the many tangible benefits of DMARC, including monitoring, quarantining, and rejecting potentially harmful emails based on various indicators, many organizations have not moved to implement DMARC to make a positive difference in email protection and delivery worldwide. This paper highlights the benefits and outline steps that security technology departments can take to effectively partner with internal stakeholders (such as Sales and Marketing) to establish a win-win scenario of appropriately protecting the enterprise while furthering business goals.
39420 (PDF, 1.88MB)
12 Feb 2020Related Content
SANS 2025 CTI Survey Webcast & Forum: Navigating Uncertainty in Today’s Threat Landscape
Research PaperThis paper explores results from the SANS 2025 CTI Survey, with insights into how cybersecurity...
- 20 May 2025
- Rebekah Brown, Andreas Sfakianakis
ARMO’s Behavioral Cloud Application Detection and Response (CADR) Platform
Research PaperThis paper explores how ARMO Platform is attempting to solve the challenge with the industry’s first behavioral cloud application detection and response (CADR) product.
- 18 Mar 2025
- Moses Frost
ASPM: Understanding the New Application Security Landscape
Research PaperMalicious actors continue to prey on the challenges of rapid software development cycles and cloud computing adoption. This paper examines where an application security posture management (ASPM) solution comes in.
- 18 Mar 2025
- Chris Edmundson, SANS Institute
2025 ICS/OT Cybersecurity Budget: Spending Trends, Challenges, and the Future
Research PaperThis white paper explores the findings of the 2025 SANS Survey on ICS/OT Security Budgets.
- 3 Mar 2025
- Dean Parsons
2025 SANS Detection Engineering Survey: Evolving Practices in Modern Security Operations
Research PaperTo dive deep into understanding the current state and future trends of this critical field, SANS has partnered with Anvilogic to conduct a comprehensive survey of Detection Engineering professionals across various industries. Dive into the findings in this whitepaper.
- 24 Feb 2025
- Terrence Williams
Recover an RSA Private Key from a TLS v1.2 session
Research PaperCyberattacks happen every day.Most organizations have administrative and technical controls...
- 22 Jun 2022
Recommendations for small/medium-sized businesses enabling incident response
Research PaperSecurity incidents are inevitable. While large businesses can afford security teams to prepare and...
- 17 Jan 2022
Practical implementation of the Australian Signals Directorate Essential Eight Maturity Model to Level Three within residential University colleges.
Research PaperThe Australian Signals Directorate (ASD) Essential Eight Maturity Model is a subset of the ASDs...
- 21 Aug 2018
Privacy and the Internet of Things
Research PaperThe Internet of Things has gotten a lot of attention over the past year or so, and for good reason....
- 25 Oct 2017
The Information We Seek
Research PaperWhether you are performing a penetration test, conducting an investigation, or are skilled attackers...
- 25 Oct 2016
Windows Installed Software Inventory
Research PaperThe 20 Critical Controls provide a guideline for the controls that need to be placed in our networks...
- 7 Sep 2016
- Jonathan Risto
Applying Machine Learning Techniques to Measure Critical Security Controls
Research PaperImplementing and measuring Critical Security Controls (CSC) requires analyzing all data types...
- 6 Sep 2016
Android Security: Web Browsers and Email Applications
Research PaperMobile devices are popular communication tools that allow people to stay connected in most places at...
- 29 Aug 2016
Simple Approach to Access Control: Port Control and MAC Filtering
Research PaperMany times businesses will spend time and money on 'Magic Bullet' security and focus on a single...
- 22 Aug 2016
Generating Hypotheses for Successful Threat Hunting
Research PaperThreat hunting is a proactive and iterative approach to detecting threats. Although threat hunters...
- 15 Aug 2016
- Robert M. Lee, David Bianco
Evaluating Cyber Risk in Engineering Environments: A Proposed Framework and Methodology
Research PaperEvaluating Cyber Risk in Engineering Environments: A Proposed Framework and Methodology
- 31 May 2016
Detecting a Targeted Data Breach with Ease: A SANS Product Review
Research PaperA product review by Jake Williams. It examines LightCyber Magna, focusing on itseffectiveness in...
- 21 Oct 2015
- Jake Williams
Case Study: Critical Controls that Sony Should Have Implemented
Research PaperOn November 24, 2014, an incident almost pulled right out of a 90's hacker movie transformed into a...
- 22 Jun 2015
The What, Where and How of Protecting Healthcare Data
Research PaperMitigating healthcare data-loss risk by understanding the What, Where, and How of Protecting...
- 6 Apr 2015
- James Tarala
Let's face it, you are probably compromised. What next?
Research PaperLong live the operator! At a point in time, they were the backbone of the phone system, ensuring...
- 15 Dec 2014
