Application Security

1/2/2018
10:45 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

DHS Directive Increases Federal DMARC Adoption 38 Percent in 30 Days

Agari Analytics Indicate Illicit Email Traffic Sharply Declines for Early Adopters of DMARC; Department of Homeland Security to Keynote DMARC Implementation Breakfast on January 18

SAN MATEO, Calif. – January 2, 2018 – Agari, a leading cybersecurity company, today announced the publication of  a new research report, “U.S. Federal Government DMARC Adoption,” which reveals that federal domain adoption of DMARC increased 38 percent (13 percentage points) in 30 days, from 34 percent on November 18, 2017 to 47 percent on December 18, 2017. This increase of 151 domains shows rapid adoption of DMARC, a critical email authentication standard, ahead of the initial, January 15, 2018, deadline for the Department of Homeland Security (DHS) Binding Operational Directive (BOD) 18-01. Agari will present this research at a Federal Breakfast Workshop on January 18, 2018, where DHS Assistant Secretary for the Office of Cybersecurity and Communications Jeanette Manfra will provide keynote remarks.

“DMARC has proven to be an effective solution to secure our federal domains, but more work is needed to protect all federal domains. The time to act is now –deadlines to comply with BOD 18-01 are imminent,” said Jeanette Manfra, assistant secretary for the Office of Cybersecurity and Communications, Department of Homeland Security. “Cybersecurity is a critical component of our homeland security policy, but it is also a shared responsibility. It is crucial for U.S. citizens to trust that an email from a government agency is legitimate.”

Agari research also shows the effectiveness of the DMARC security control across federal agencies. Of the billions of emails sent across the more than 400 federal government domains secured by Agari, ninety-six percent of the emails are protected by the strongest DMARC policy (p=reject) nearly a year ahead of the BOD 18-01. As a result, those federal domains protected by DMARC at p=reject, including the U.S. Senate, Veterans Affairs, Health and Human Services, and the U.S. Post Office have seen attempted fraud send rates decrease to less than two percent in December.

“This research shows that DMARC does more than protect federal domains, it protects all of us – even our mothers and fathers – from billions of phishing emails every day,” said Patrick Peterson, Founder and Executive Chairman, Agari. “The increase in adoption is a smashing early success. We hope that all agencies with follow Agari’s federal agency clients, including the U.S. Senate, Health and Human Services, Customs and Border Protection, U.S. Census Bureau, Veterans Affairs and the U.S. Postal Service, to comply with the directive and help eliminate phishing and spam related to domain spoofing and ensure a trusted digital channel for US citizens.”

DHS announced BOD 18-01 on October 16, 2017, during a Global Cybersecurity Alliance (GCA) event in New York City. BOD 18-01 mandates that all federal domains implement DMARC, TLS and HTTPS to prevent domain name spoofing and to secure email communication. Federal departments and agencies have 90 days to implement DMARC at its lowest setting (monitoring, P=none) and one year to implement DMARC at its highest setting (P=reject), which prevents unauthorized mail from being sent.

Since the DHS announcement, DMARC adoption rates among federal domains have improved across the board. Thirty-one percent have deployed DMARC as p=none, compared to 20 percent on November 18, and 16 percent have deployed DMARC to quarantine or reject unauthenticated email, compared to 14 percent on November 18. Still, 53 percent still have not deployed DMARC, just weeks ahead of the DHS deadline.

More than 20 federal agencies have achieved 100 percent DMARC adoption across their domains, including the Federal Communication Commission, the Federal Trade Commission, and the Department of Veterans Affairs. Additionally, the Department of Health and Human Service is the only federal agency to have deployed DMARC across more than 100 domains.

 

***ALERT***

Agari Federal Breakfast Workshop: How to Comply with BOD 18-01

When:             January 18, 2018

Where:            The City Club of Washington DC

Agenda:          7:30 am EST – Keynote Remarks – Jeanette Manfra, Assistant Secretary for the Office of Cybersecurity and Communications, DHS

8:00 am EST – Federal DMARC Research – Patrick Peterson, Founder & Executive Chairman Agari

                        8:30 am EST – DMARC Deployment Panel

                                                Phil Reitinger, GCA

                                                Matt Shallbetter, Director of Security Design,  DHHS

9:15 am EST – Closing Remarks – Jeanette Manfra, Assistant Secretary for the Office of Cybersecurity and Communications DHS

                       

Download the updated report: “U.S. Federal Government DMARC Adoption

Register for the “Federal Breakfast Workshop: How to Comply with BOD 18-01

 

About Agari
Agari, a leading cybersecurity company, is trusted by leading Fortune 1000 companies to protect their enterprise, partners and customers from advanced email phishing attacks. The Agari Email Trust Platform is the industry’s only solution that ‘understands’ the true sender of emails, leveraging the company’s proprietary, global email telemetry network and patent-pending, predictive Agari Trust Analytics to identify and stop phishing attacks. The platform powers Agari Enterprise Protect, which help organizations protect themselves from advanced spear phishing attacks, and Agari Customer Protect, which protects consumers from email attacks that spoof enterprise brands. Agari, a recipient of the JPMorgan Chase Hall of Innovation Award and recognized as a Gartner Cool Vendor in Security, is backed by Alloy Ventures, Battery Ventures, First Round Capital, Greylock Partners, Norwest Venture Partners and Scale Venture Partners. Learn more at http://www.agari.com and follow us on Twitter @AgariInc.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: In Russia, application hangs YOU!
Current Issue
Flash Poll
How Data Breaches Affect the Enterprise
How Data Breaches Affect the Enterprise
This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-3912
PUBLISHED: 2018-09-18
Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.
CVE-2018-6690
PUBLISHED: 2018-09-18
Accessing, modifying, or executing executable files vulnerability in Microsoft Windows client in McAfee Application and Change Control (MACC) 8.0.0 Hotfix 4 and earlier allows authenticated users to execute arbitrary code via file transfer from external system.
CVE-2018-6693
PUBLISHED: 2018-09-18
An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escal...
CVE-2018-16515
PUBLISHED: 2018-09-18
Matrix Synapse before 0.33.3.1 allows remote attackers to spoof events and possibly have unspecified other impacts by leveraging improper transaction and event signature validation.
CVE-2018-16794
PUBLISHED: 2018-09-18
Microsoft ADFS 4.0 Windows Server 2016 and previous (Active Directory Federation Services) has an SSRF vulnerability via the txtBoxEmail parameter in /adfs/ls.