Acquire
SPF DKIM DMARC - What, why and how?

SPF DKIM DMARC - What, why and how?

SPF DKIM DMARC - What, why and how?

SPF, DKIM and DMARC: why are they important and how can you set them up?

What are SPF, DKIM and DMARC? How do they contribute to setting up protection against phishing attacks and how can you set them up for your company domain?

Mantra Team
Best Practices

Most popular

More reads

Gamification & Cybersecurity

Gamification & Cybersecurity

Gamification & Cybersecurity

Best Practices

Why gamification can contribute to your cybersecurity?

Why do humans love to play? And how can using these principles and relying on gamification help your cyberdefense?

Mantra Team
Anti-spam protections can be bypassed by hackers

Anti-spam protections can be bypassed by hackers

Anti-spam protections can be bypassed by hackers

Hacking

How hackers bypass anti-spam to deliver phishing emails

Anti-spams are great! But hackers have elvoved to counter them and developed techniques to bypass them and successfully execute phishing campaigns.

Mantra Team
10 must-haves for your training through phishing simulation

10 must-haves for your training through phishing simulation

10 must-haves for your training through phishing simulation

Best Practices

Training your teams with phishing simulations : a checklist

Here are 10 must-haves for any training to be effective at lastingly changing users' behavior with regard to phishing attacks.

Mantra Team
How hackers can beat MFA

How hackers can beat MFA

How hackers can beat MFA

Hacking

How hackers beat MFA at-scale

MFA is definitely a must-have. But hackers have adapted and have developed techniques to beat it with relative ease and at-scale. Discover how

Mantra Team
Icon

Suscribe to our newsletter

All the content you need to stay up to date on the latest cyber security trends
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.