Articles about Email

15 articles

Email Tracking Privacy

Email trackers explained: pixels, link wrapping, and privacy

How email open tracking works: spy pixels, link wrapping, click tracking. Best practices for ethical tracking and better deliverability.

Simon Bressier · · 5 min
DMARC Email Security

Shadow IT and Email: The Tools Sending on Your Behalf Without You Knowing

How to detect SaaS tools sending emails from your domain without authorization: DMARC reports, unknown source identification, resolution workflow, and continuous monitoring.

Simon Bressier · · 7 min
DNS Email SPF

Email and DNS: Every Record You Need to Know

Complete guide to email-related DNS records: MX, SPF, DKIM, DMARC, MTA-STS, TLS-RPT, BIMI, PTR. Each record explained with concrete examples.

Simon Bressier · · 4 min
Email Headers DKIM

Email Headers Explained: From Received to ARC

How to read email headers: Received, Return-Path, Authentication-Results, ARC, DKIM-Signature. Complete guide to diagnosing deliverability issues.

Simon Bressier · · 3 min
DMARC Email Security

DMARC: Safely Migrating from p=none to p=reject

Step-by-step guide to moving your DMARC policy from none to reject: recommended timeline, shadow IT pitfalls, the role of RUA reports, and a migration checklist.

Simon Bressier · · 4 min
DMARC Email Security

Reading and Understanding DMARC Reports (RUA)

Practical guide to interpreting DMARC aggregate reports: XML format, legitimate vs suspicious sources, shadow IT, and how to use the data to strengthen your policy.

Simon Bressier · · 3 min
TLS Email Security

TLS and Email: Why SMTP Encryption Is Non-Negotiable

Everything about email encryption: STARTTLS, opportunistic vs enforced TLS, MTA-STS, DANE, TLS-RPT. Why Gmail shows a red padlock and how to avoid it.

Simon Bressier · · 3 min
DKIM Email Cryptography

Anatomy of a DKIM Signature: Every Field Explained

Complete dissection of a DKIM-Signature header: algorithm, body hash, canonicalization, selector, timestamp. Understanding the verification process step by step.

Simon Bressier · · 4 min
DKIM Email ESP

Why Do You See Two DKIM Signatures on a Single Email?

Technical explanation of dual DKIM signatures: why your ESP adds its own signature, the role of Gmail and Yahoo Feedback Loops, and the impact on DMARC alignment.

Simon Bressier · · 3 min
BIMI Email Security

BIMI: Display Your Logo in Email Inboxes

Complete guide to BIMI (Brand Indicators for Message Identification): prerequisites, VMC certificate, DNS setup and impact on trust.

Simon Bressier · · 3 min
DMARC Email Security

How to Configure DMARC to Protect Your Domain

Complete guide to setting up a DMARC record on your domain: syntax, policies, RUA reports and best practices.

Simon Bressier · · 3 min
Blacklist Email Reputation

Email Blacklists: Understand, Check and Get Delisted

Everything about email blacklists (RBL/DNSBL): how they work, why your IP or domain is listed, and how to get removed step by step.

Simon Bressier · · 3 min
Deliverability Email Reputation

Email Deliverability: The Ultimate Guide to Reaching the Inbox

Understand the factors that influence your email deliverability: IP reputation, DNS authentication, content, engagement and monitoring.

Simon Bressier · · 3 min
DKIM Email Security

DKIM: Sign Your Emails to Prove Their Authenticity

Complete guide to DKIM (DomainKeys Identified Mail): how cryptographic signatures work, DNS setup, key rotation and troubleshooting.

Simon Bressier · · 4 min
SPF Email DNS

SPF: The Complete Guide to Authorizing Your Sending Servers

Everything you need to know about SPF (Sender Policy Framework): syntax, mechanisms, the 10 DNS lookup limit, and step-by-step configuration.

Simon Bressier · · 3 min
View all tags