Resources

On-Demand Webinar

Federal Webinar - How to Comply with BOD 18-01

This web panel with DHS, HHS, the Global Cybersecurity Alliance and Agari provides clarity on DMARC and BOD 18-01 compliance. Watch now.
Video

Using Agari in Messaging Operations

    Transcript    The number one email-based challenge that businesses face today is stopping the advanced identity-based attack. This is the attack where the bad guy impersonates one of your high-value employees and then uses that impersonated email to either get money out of the company via a wire transfer, or to get credentials and get into the company systems to...
On-Demand Webinar

Cosmic Lynx Threat Disorder: The Rise of Russian BEC

In this webinar, Agari Sr. Director of Threat Research, Crane Hassold discusses Cosmic Lynx, the first-ever reported Russian BEC criminal organization, and how the group has significantly impacted the email threat landscape with sophisticated, high-dollar phishing attacks.
Video

Agari DMARC Protection Explainer

Transcript Email remains the most popular method for businesscommunications. It's also the number one target for cyber attacks. And one malicious email is all it takes to destroy years ofbuilding a trusted relationship with your custom versuswhich is why DMARC is an essential email securitysolution that prevents cyber attacks from hijacking yourdomains for email spoofing, executive...
Video

How and Why COVID-19 is Being Used for BEC and Phishing Attacks

Phishing and Business Email Compromise (BEC) attacks always take advantage of natural disasters and personal misfortune to target even the most vulnerable among us. This time is no different as we are all experiencing the COVID-19 outbreak, but the tactics can be spotted and defeated. In this webinar Crane Hassold, Agari's former Senior Director of Threat Research, provides an inside look into...
Video

Using Agari in Marketing

    Transcript Email security is often overlooked when thinking about brand protection, but it's actually very pivotal. On one hand, I want to make sure as a CMO that I am disallowing anyone from co-opting my brand to spoof consumers or customers. That's very important to me. On the other hand, I want to make sure that my email, my legitimate message that I'm sharing...
Video

Farm Bureau Bank

"Since email security is so important, we work very hard to ensure the transport of email is done efficiently as we as securely." - Howard Gordon, Vice President and Information Security Officer
Blog

SMTPS: Securing SMTP and the Differences Between SSL, TLS, and the Ports They Use

What is the difference between SMTPS and SMTP? SMTPS uses additional SSL or TLS cryptographic protocols for improved security, and the extra "S" stands for SECURE! By default, SMTP to send email lacks encryption and can be used for sending without any protection in place, leaving emails with an SMTP setup susceptible to man-in-the-middle attacks and...
Blog

5 Big Myths about DMARC, Debunked

With email attacks contributing to billions of lost dollars each year, a growing number of organizations are adopting Domain-based Message Authentication, Reporting & Conformance (DMARC) in an effort to protect themselves and their customers from fraudsters. Adoption of DMARC has steadily gained traction since the onset of the pandemic, and the original email authentication protocols at the heart...
Blog

2022 Data Privacy Week – Education and Inspiration

As the world becomes more and more dependent on online resources to complete daily tasks, such as work meetings, grocery shopping, and even exercising, the risk of cyber attacks, data breaches, and information stealing increases. If you’re not already protecting your personal information online, now is the perfect time to start, as Data Privacy Weeks kicks off today.Led by the National Cyber...