Five myths of email authentication Email is one of the most vulnerable points in an enterprise's cyber defenses. Multiple studies (from Proofpoint, Verizon, and others) have shown that over 90% of all cyberattacks start with email-based phishing. An anti-impersonation defense focused on email authentication can block a significant portion of these exploits, but there is [...]