Tag Archives: DKIM

Understanding DKIM Authentication

understanding-dkim-authentication

Email Authentication Series Part 1: Why Email Authentication Matters to Your Email Program Part 2: Understanding SPF Authentication > Part 3: Understanding DKIM Authentication Part 4: Understanding DMARC Authentication Part 5: Understanding BIMI How DKIM helps to protect content If you’ve been following our email authentication series—it’s time to get your wetsuit on—we’re about to dive deep into DKIM (DomainKeys Identified Mail) and how it…

Read More »

Why Email Authentication Matters to Your Email Program

why-email-authentication-matters-to-your-email-program

An Introduction to Email Authentication Have you ever received an email from yourself, but you never sent it? (tires screeching, brakes burning) What?! If you’re nodding, you know too much about email. If not, this series is for you. Email is flexible, adaptable, and ever-evolving in its purpose. Sadly malicious actors have taken advantage of these qualities, which is why we have anti-spam laws, spam…

Read More »

Can I Share My Sending Domain?

can-i-share-my-sending-domain?

Thinking about email in its simplest form, you have where it’s from, where it’s going, and how it looks. How the email is displayed is very visually friendly. HTML is converted into images and formatted text. And the sending details with the Mail Transfer Agent (MTA) conversations are tucked away into the headers. Reputation, a key component in deliverability, is heavily tied to some of…

Read More »

What is a deliverability audit?

what-is-a-deliverability-audit?

What comes to mind when you hear the word ‘audit?’ We bet you don’t automatically think of email deliverability. Many businesses are completely unaware that they might have email deliverability issues. In fact, most marketers aren’t totally sure what the word ‘deliverability’ means. Some are simply uneducated on the subject, and others are afraid to […] The post What is a deliverability audit? first appeared…

Read More »

Some Microsoft thoughts

some-microsoft-thoughts

Right at the end of January, Microsoft appears to have made couple of changes to how they’re handling authentication. The interesting piece of this is that, in both cases, Microsoft is taking authentication protocols and using them in ways that are slightly outside the spec, but are logical extensions of the spec. The first is an extension of DMARC. They’re rolling out inbox flags for…

Read More »

Cost of authentication

cost-of-authentication

At the end of last year, Steve wrote a post about the different types of authentication. I thought I’d build on that and write about the costs associated with each type. While I know a lot of my readers are actually on the sending side, I’m also going to talk about the costs associated with the receiving side and a little bit about the costs…

Read More »

Top Ten Tips to Improve Your Email Deliverability

top-ten-tips-to-improve-your-email-deliverability

You’ve written, designed, coded, and sent your email. Job is complete; no worries, right? What if your email then lands in your subscribers’ spam folders? All that work beforehand isn’t going to matter much now. Managing and deploying an email to a list of any size can be stressful, and sometimes you just want to hit send after looking at it for so long. However,…

Read More »
>