Resources

Blog

Agari and RiskIQ Join Forces to Share Threat Data to Fight Cyber Criminals

Threat intelligence exchange will benefit Agari and RiskIQ customers through heightened security awareness and the ability to respond to discovered threatsSAN MATEO, Calif. — Sept. 15, 2015 — Agari, the leading provider of data-driven security solutions that detect and prevent advanced email cyberthreats, and RiskIQ, the Enterprise Digital Footprint Security company, today...
Blog

Airflow DAG @ Agari

Workflow Schedulers Workflow schedulers are systems that are responsibile for the periodic execution of workflows in a reliable and scalable manner. Workflow schedulers are pervasive - for instance, any company that has a data warehouse, a specialized database typically used for reporting, uses a workflow scheduler to coordinate nightly data loads into the data warehouse. Of...
Blog

What is 'Zero-Trust'?

With the X-Files soon making a return to the small screen (!!!), I have been thinking a lot lately about the concept of trust. Specifically as it relates to security, and especially the concept of "Zero-Trust". Many security front-runners have begun enacting a new security architecture called Zero-Trust Networking and it really took off when Google decided to implement it....
Blog

Automated Model Building with EMR, Spark, and Airflow

Data science applications provide much of the power behind Agari’s e-mail security products. The e-mail landscape is vast and dynamic, and we require the ability to regularly analyze incoming data. Models including forwarder classification, malicious campaign identification, domain reputation, and inbound sender modeling are created on hourly to daily cadences. We therefore...
Blog

Data Science at Agari: Forwarder Classification

MotivationAmong the challenges that our engineering team faces is the ability to classify an email-sending entity as a forwarder. At Agari, we are primarily interested in the authentication of emails from originating senders. Forwarders are defined as entities which forward messages from originating senders as well as from other forwarders. Examples include servers in...
Blog

Scaling Postfix on AWS with Elastic Load Balancing

Agari's mission to solve email phishing often presents unique technical challenges. Our data ingestion process involves coping with large-scale inbound SMTP traffic. We've chosen Postfix as our MTA of choice. The traditional way to scale SMTP is simply to maintain MX records for multiple ingestion paths. This works but can be very limiting. Agari's Amazon Web Services-hosted...
Blog

Agari Recognized by OTA for Commitment to Online Trust and Security

Fourth consecutive year that Agari is honored for its leadership in brand protection, privacy and securitySAN MATEO, Calif. – June 16, 2015 – Agari, the leading provider of data-driven security solutions that detect and prevent advanced email cyber threats, today announced it has been chosen for the Online Trust Alliance (OTA) 2015 Online Trust Honor Roll for the fourth...
Blog

Why Email Marketers Need to Know About DMARC and Email Security

By Brad van der Woerd, Director, Market Intelligence & Deliverability at Yesmail Read original post here.Early last year, we published a blog post informing marketers about the occurrences of cyber crime within the email security landscape via methods such as email phishing and domain spoofing. We also shared details about a form of email technology called Domain-based Message...
Blog

Leveraging AWS to Build a Scalable Data Pipeline

Data-rich companies (e.g. LinkedIn, Facebook, Google, and Twitter) have historically built custom data pipelines over bare metal in custom-designed data centers. In order to meet strict requirements on data security, fault-tolerance, cost control, job scalability, and uptime, they need to closely manage their core technology. Like serving systems (e.g. web application servers...
Blog

Cyber Security Reflections on 2014

Over a year ago, Target publicly acknowledged the now infamous data breach. For many weeks afterwards, news of the Target breach dominated the headlines. Cyber security was no longer just a topic for security professionals; the topic had gone mainstream. Sadly, 2013 was quickly eclipsed by 2014 in terms of data breaches. In a report released on December 9th, 2014, the Identity...
Blog

The Fours Types of Senders: Forwarders

Series Introduction l Internal Infrastructure l Third Party SendersJohn Wilson, Director, Sales EngineeringLet’s re-visit our cocktail party scenario to illustrate how this third type of sender works, because who doesn’t love a good party? Someone again hands you a business card, this time with a PayPal logo on it. You ask them how they like working at PayPal, and the person...
Blog

The Four Types of Senders: Third Party Senders

Series Introduction l Internal InfrastructureErika NJ Alperin, Brand ManagerPrevious article in the series can be found hereLet’s go back to the cocktail party scenario I talked about last week. Imagine you are at a cocktail party and someone you don’t know hands you their business card and the card has your company logo on it. Maybe you work for a big company and don’t know...
Blog

Agari Partners with Palo Alto Networks

In a further expansion of the Agari Trust Network’s data exchange program, Agari and Palo Alto Networks have partnered to exchange email-based threat data. The idea is simple, but incredibly powerful.1) Time to detection acceleratedAgari detects potential email-based malware in near real-time. This leads to faster detection of email-based malware than previously possible by any...
Blog

Surprising Information About Your Email Channel

The Four Senders of Your Domain's Email ChannelImagine you are networking at a cocktail party. While there, you find out that someone at the party is handing out business cards with your name and company logo on them. You have no clue who this person is or what their intentions are. Are they maliciously trying to ruin your reputation or is this some kind of awkward...
Blog

Tales from the Cyber Crypt

By Danielle DeWereWolfOne dark and stormy night, Shawn was working late on his computer. Usually he would be in bed by now, but the loud clap of lightning and roar of the wind made sleep impossible. Instead, Shawn thought he would catch up on some email. He walked over to the kitchen and set the kettle on the stove to boil. Sitting back down at the dining room table he opened...
Blog

Cousin Domain Feature in Agari

Cousin Domain - No Email Threats Should Go UncoveredAgariPRO now gives you the power to find threats that may not yet be uncovered by DMARC with our new Cousin Domain feature.This feature gives companies insight into cousin domains, domain names that are made to look similar to the real domain of a well known brand, with the intent of fooling the email recipient. This gives...
Blog

Agari Keeps JPMorgan Chase Customers Safe from Email Attacks

JPMorgan Chase said last week that cybercriminals had compromised its systems and obtained customer names, phone numbers and email addresses for 76 million households, and as a result people will be concerned about how their data is being used following the breach. But one recent article suggested that phishing scams are a possible outcome, and in the case of JPMorgan Chase, we...
Blog

What is Identifier Alignment?

When you begin to work with DMARC, you realize just how important identifier alignment is. Identifier alignment forces the domains authenticated by SPF and DKIM to have a relationship to the "header From" domain. Header From Domain and the MailFrom domain are different?Yes, they are! Hearing these terms can confuse people. They sound like the same thing, but in reality they are...
Blog

I just got owned.

by Chris Meidinger What’s the most embarrassing thing that could happen to someone in the anti-fraud business? For me, it’s definitely surrendering your credit card details to a scammer. Yeah. That just happened. Embarrassing, but rather than put my tail between my legs and run away I thought I’d use the opportunity to examine the experience and to remind myself to stay hyper...
Blog

TLS and DMARC

As a member of the Netscape browser team in the mid-to-late 90's, I participated on the front lines in the browser wars. I'm not just talking about the competition between Netscape and Microsoft for market share, but the battle between those of us trying to establish the browser as the next-generation application platform and the criminals trying to exploit it for nefarious...