<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Email Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/category/email/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/category/email</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Thu, 27 Jun 2024 18:22:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>Email Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/category/email</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Webinar takeaway &#8211; MailFail &#8211; Who&#8217;s Spoofing Your Email and How Are They Doing It?</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-mailfail-whos-spoofing-your-email-and-how-are-they-doing-it</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-mailfail-whos-spoofing-your-email-and-how-are-they-doing-it#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 27 Jun 2024 18:22:15 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[dkim]]></category>
		<category><![CDATA[dmarc]]></category>
		<category><![CDATA[spf]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1452</guid>

					<description><![CDATA[<p>My key takeaways SPF ensures that the SMTP FROM domain explicitly allows the connecting IP address. SPF does NOT ensure that the email address seen by the user is the one which was checked. the existance of SMTP FROM and the From field is a vulnarability: SPF checks SMTP FROM but most mail clients show [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-mailfail-whos-spoofing-your-email-and-how-are-they-doing-it">Webinar takeaway &#8211; MailFail &#8211; Who&#8217;s Spoofing Your Email and How Are They Doing It?</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-mailfail-whos-spoofing-your-email-and-how-are-they-doing-it/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway &#8211; How to Detect and Respond to Business Email (M365) Compromise</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-detect-and-respond-to-business-email-m365</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-detect-and-respond-to-business-email-m365#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 24 Feb 2022 19:18:55 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[fraud]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=866</guid>

					<description><![CDATA[<p>My key takeaways BEC external-to-internal passes all technical security measures like SPF, DKIM and DMARC BEC internal-to-internal bypasses anti-spam solutions Get comfy with PowerShell to interact with M365 since Jan 2019 MS enabled mailbox auditing for Exchange Online CrowdStrike Reporting Tool also reviews excessive permissions in Azure AD If you are suspiscous to have a [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-detect-and-respond-to-business-email-m365">Webinar takeaway &#8211; How to Detect and Respond to Business Email (M365) Compromise</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-detect-and-respond-to-business-email-m365/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Implement DMARC the Right Way to Keep Phishing Attacks Out of Your Inbox</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-implement-dmarc-the-right-way-to-keep-phishing-attacks-out-of-your-inbox</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-implement-dmarc-the-right-way-to-keep-phishing-attacks-out-of-your-inbox#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 15 Jul 2021 19:10:52 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[deliverability]]></category>
		<category><![CDATA[dkim]]></category>
		<category><![CDATA[dmarc]]></category>
		<category><![CDATA[email marketing]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[spf]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=529</guid>

					<description><![CDATA[<p>My key takeaways DMARC uses SPF and/or DKIM In 2021 the National Defense Authorization Act says the Department of Homeland Security (DHS) must implement DMARC US wide there exists an RFC for &#34;email from&#34; SPF = receiving email server checks MAIL FROM address or the domain’s IP address in the HELO handshake against the sender’s [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-implement-dmarc-the-right-way-to-keep-phishing-attacks-out-of-your-inbox">Webinar takeaway: Implement DMARC the Right Way to Keep Phishing Attacks Out of Your Inbox</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-implement-dmarc-the-right-way-to-keep-phishing-attacks-out-of-your-inbox/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: Roger Grimes Teaches You Phishing Mitigation</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-roger-grimes-teaches-you-phishing-mitigation</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-roger-grimes-teaches-you-phishing-mitigation#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 12 May 2021 19:00:36 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[phishing]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=453</guid>

					<description><![CDATA[<p>My key takeaways ~40 threats/day in 2020 to take care of top 3 initial breach root causes social engineering unpatched software (&#62;90% Java) medium threat general mitigations policies tech. defenses security awareness training Also educate your vendors about your AUP include a phishing mitigation section in your AUP paying everybody $1000/year who doesn&#8217;t fall for [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-roger-grimes-teaches-you-phishing-mitigation">Webinar Takeaway: Roger Grimes Teaches You Phishing Mitigation</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-roger-grimes-teaches-you-phishing-mitigation/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: How to Build a Phishing Engagement &#8211; Coding TTP´s</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-build-a-phishing-engagement-coding-ttps</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-build-a-phishing-engagement-coding-ttps#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 01 Apr 2021 18:17:02 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[webinar takeaway]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=382</guid>

					<description><![CDATA[<p>My key takeaways Automation tools like Ansilble, terraform and docker can also create a evil environment eg for phishing Don&#8217;t put sensible tokens or passwords in ainsible config files but use a cloud password manager and pull the pass as variable into ainsible Best of phishing themes: give away 2 iPhones or check a link [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-build-a-phishing-engagement-coding-ttps">Webinar Takeaway: How to Build a Phishing Engagement &#8211; Coding TTP´s</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-build-a-phishing-engagement-coding-ttps/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>3 more ideas which might impact email marketing in 2021</title>
		<link>https://jeanchristophvonoertzen.com/3-more-ideas-which-might-impact-email-marketing-in-2021</link>
					<comments>https://jeanchristophvonoertzen.com/3-more-ideas-which-might-impact-email-marketing-in-2021#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 28 Dec 2020 12:06:48 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[deliverability]]></category>
		<category><![CDATA[email marketing]]></category>
		<category><![CDATA[GAN]]></category>
		<category><![CDATA[GPT-3]]></category>
		<category><![CDATA[trends]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=309</guid>

					<description><![CDATA[<p>Jordie van Rijn wrote an article very inspiring to me, in which he aggregated different aspects and trends of what shaped email marketing automation in 2020 and what might have an impact in 2021. I would like to add 3 more ideas which might impact email marketing in 2021. TL;DR Phishing is black hat email [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/3-more-ideas-which-might-impact-email-marketing-in-2021">3 more ideas which might impact email marketing in 2021</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/3-more-ideas-which-might-impact-email-marketing-in-2021/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
