Reviewing X Sender Headers: How to Prevent Email Spoofing From Fake Senders

February 20, 2019 | Austin Hummert
Austin Hummert

Austin Hummert

Threat Engineer

I'm a threat engineer, focusing on cyber security operations center triage along with security awareness and security infrastructure. I've been in the industry for 6 years with a bachelors degree in computer forensics along with gcia, gcih, gsec, and Cisco certified sourcefire admin.

February 20, 2019 | Austin Hummert

Reviewing X Sender Headers: How to Prevent Email Spoofing From Fake Senders

Internet fraud is one of the most common motivators of cybercrime. Millions of dollars are stolen every year from victims who are tricked into initiating wire transfer payments through social engineering tactics and computer breaches. This is typically accomplished using one of three methods: business email compromise (BEC), email account compromise (EAC), and spoofing. All three of these methods can…

Watch a Demo ›
Get Price Free Trial