B D E S T W
  • Jean-Christoph von Oertzen
  • Blog
  • Infosec glossary
  • Home
  • |
  • Tag: phishing

vulnerabilities, threats, attacks and countermeasures

BGH

BGH: Big Game Hunting Big Game Hunting (BGH) refers to a type of cyber ...

Read More

principles, frameworks and best practices

DKIM

DKIM: DomainKeys Identified Mail […] permits a person, role, or organization that owns the ...

Read More

principles, frameworks and best practices

DMARC

DMARC: Domain-based Message Authentication, Reporting, and Conformance […] is a scalable mechanism by which ...

Read More

Security

Ethical considerations in phishing tests: to inform employees or not?

TL;DR This article delves into the ethical considerations in phishing tests, highlighting the balance ...

Read More

vulnerabilities, threats, attacks and countermeasures

S/MIME

S/MIME: Secure/Multipurpose Internet Mail Extensions […] a technology that allows you to encrypt your ...

Read More

principles, frameworks and best practices

SPF

SPF: Sender Policy Framework […] a domain may explicitly authorize the hosts that are ...

Read More
Load More

Copyright 2025 Jean-Christoph von Oertzen - Privacy policy - Imprint