{"id":553,"date":"2004-08-12T00:00:00","date_gmt":"2004-08-12T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/08\/12\/microsoft-garners-support-for-authentication-scheme\/"},"modified":"2021-12-30T11:37:39","modified_gmt":"2021-12-30T11:37:39","slug":"microsoft-garners-support-for-authentication-scheme","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/08\/12\/microsoft-garners-support-for-authentication-scheme\/","title":{"rendered":"Microsoft Garners Support For Authentication Scheme"},"content":{"rendered":"<p>Microsoft hosted a meeting with more than 80 e-mail providers to spread the news about its Sender ID authentication scheme, and got the support from some heavyweights in the messaging security market, such as Tumbleweed, Cloudmark, and VeriSign.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The summit was requested by the E-mail Service Provider Coalition (ESPC), an industry group formed primarily of e-mail marketing firms who are trying to get ahead of the spam curve.<\/p>\n<p>&#8220;The biggest thing is the groundswell of support for the Sender ID framework,&#8221; said Craig Spiezle, the director of industry and partner relations for Microsoft&#8217;s Safety Technology and Strategy Team, in a statement.<\/p>\n<p>Tumbleweed, for instance, which already supports both Caller ID and SPF, said Thursday it would add support for Sender ID to its Email Firewall when it revs to 6.1 in the near future.<\/p>\n<p>Sender authentication schemes could also put a stop to most phishing attacks, the e-mail generated scams that purport to be messages from legitimate companies, but are actually attempts to trick consumers into divulging confidential information such as bank and credit card account numbers.<\/p>\n<p>http:\/\/www.techweb.com\/wire\/story\/TWB20040812S0004<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-553","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/553","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=553"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/553\/revisions"}],"predecessor-version":[{"id":3040,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/553\/revisions\/3040"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=553"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=553"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=553"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}