AT&T Cybersecurity – Boundary Defense with Sender Policy Framework 3.13 3.13.16
This resource provides a list of free and commercial tools for implementing SPF.
This resource provides a list of free and commercial tools for implementing SPF.
This article explains the difference DMARC, SPF and DKIM and how to use them to secure you email environment
This NIST Special Publication provides recommendations to facilitate more efficient and effective storage encryption solution design, implementation, and management for Federal departments and agencies.
This NIST Special Publication is one part in a series of documents intended to provide guidance to the Federal Government for using cryptography to protect its sensitive, but unclassified digitized information during transmission and while in storage.
NIST resource that define requirements for proper protection of confidentiality and integrity of transmitted information.
This SANS provided policy outlines the requirements for protecting encryption keys that are under the control of end users.
This SANS whitepaper defines FIPS, identify FIPS approved encryption algorithms, and examine some different vendor solutions and their use of these approved algorithms.
This video from SANS educates viewers on the positive and negative aspects of using full disk encryption for security.