Email authentication in 2026: What every organization still gets wrong - SC Media
SC MediaArchived Mar 31, 2026✓ Full text saved
Email authentication in 2026: What every organization still gets wrong SC Media
Full text archived locally
✦ AI Summary· Claude Sonnet
Despite decades of efforts to the contrary, email remains one of the primary means of entry for cyberattacks, with vectors ranging from phishing to business email compromise (BEC). Verizon's 2025 Data Breach Investigations Report shows that most breaches still involve a human element, such as account credentials stolen through phishing.
More than a decade ago, strong protocols and tools designed to stop email spoofing and impersonation became widely available. Yet most organizations still haven't implemented these controls.
Today, the gap between awareness and action has become untenable. With mailbox providers like Google and Microsoft tightening sender requirements and government regulators demanding greater security measures, 2026 is the year when "good enough" email security is no longer good enough. The fundamentals — SPF, DKIM, and/or DMARC — must be correctly deployed and fully enforced.
The organizations that succeed in this effort will be those that move beyond monitoring, embrace full enforcement, and treat email authentication not as a one-time project, but as an ongoing operational discipline.
The three pillars of modern email authentication
Modern email authentication rests on three core protocols: Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting and Conformance (DMARC). Each plays a specific role, but together they create a system that makes email traffic attributable and trustworthy.
SPF, formulated in the early 2000s, verifies that a sending server is authorized to send mail on behalf of a domain. DKIM, which quickly followed SPF, adds a cryptographic signature to ensure that a message did indeed originate from the attested domain. DMARC, first implemented around 2013, ties SPF and DKIM together and tells receiving mail systems what to do if authentication fails.
The challenge is not that these technologies are new or unproven. It's that they are often misunderstood or poorly implemented.
As Red Sift Technical Lead Faisal Misle explains, organizations tend to fall into three categories regarding DKIM, DMARC and SPF: those who don't understand the protocols, those who understand them but lack time or priority to implement the protocols, and those who believe they've implemented them correctly when they in fact haven't.
"I would split it into three tiers," Misle says. "A — I don't know how to. B — I don't have time / it's not a priority until it happens to me / nobody will care or give me the resources."
"And the third bucket is a mix of the two," he adds. "It's more like, 'I don't know what it is.' Or maybe it's, 'Hey, we have an external third party that does it for us.' Or hey, 'I think I already did it once. I just read what it said on the Internet and plugged it in.'"
Compounding the issue is email's legacy design. None of email's core protocols (including SMTP, POP and IMAP) were designed to be secure, and the various forms of authentication implemented since then have been effectively retrofits layered onto a 40-plus-year-old framework.
The complexity associated with bolting authentication onto email, combined with limited internal expertise in most organizations, slows adoption of email security measures.
The result has been widespread email security exposure. According to Cloudflare's 2026 threat report, 46% of all emails fail DMARC validation, highlighting just how much unauthenticated traffic still flows through global systems.
The regulatory case for email authentication
Beyond maintaining security in your organization, there's a strong push from regulators on both sides of the Atlantic to spruce up your email authentication protocols to meet minimum regulatory requirements.
In the U.S., the Cybersecurity and Infrastructure Security Agency (CISA) in 2017 issued Binding Operational Directive (BOD) 18-01, which obliges government agencies to implement full DMARC or an equivalent level of authentication security.
The European Union has the Digital Operational Resilience Act (DORA), and Misle says there are similar national regulations in Germany and the UK.
"DORA is the main one that basically tells companies, 'If your cyberattack could have been avoided and you did not take all the necessary measures to avoid it, you're liable and cyber insurance does not cover you," says Misle. "It doesn't explicitly mention DMARC, but ... DMARC is a way to protect yourself from many email-borne attacks."
The other pressure point is that many cloud-based email providers are starting to require DMARC. If your email messages don't have DMARC authentication, they may not make it to the intended recipients.
How to avoid the trap of a DMARC monitoring-only policy
One of the most common and dangerous mistakes organizations make regarding email security is stopping their DMARC deployments at monitoring-only mode. This phase is intended to be only a temporary step to inventory legitimate email sources and identify gaps before implementing further stages of DMARC. But many organizations never move beyond it.
The consequences are significant. As Misle bluntly puts it, staying in monitoring mode is "pretty much the same as having no DMARC." You gain visibility into attacks through reporting, but you do nothing to stop them.
"It's like putting a security camera on your front door but leaving your front door open," says Misle. "You'll be able to see who's coming in and out, but you won't be able to control who's coming in and out.
The hesitation to move forward with DMARC is understandable. Transitioning to full DMARC enforcement requires identifying all legitimate senders. It also introduces the risk of disrupting legitimate communication if configurations are incomplete.
Many organizations settle on a compromise by leaving DMARC in quarantine mode, the second of three phases of deployment, in which unauthenticated messages are not rejected but instead sent to spam folders.
However, Misle warns that this is not a true safeguard. Users can, he said, and often do retrieve messages from junk folders, especially if they appear to come from trusted contacts. That creates a persistent risk of successful phishing or fraud.
"We've trained users to basically not 100% trust the junk folder," he says, "but there might be some legitimate things in a junk folder."
How to set a clear roadmap for full email enforcement
Reaching full DMARC enforcement, which rejects all unauthenticated email messages, requires a deliberate approach.
Begins with visibility and identify every service, platform, and vendor that sends email on behalf of your domain. This includes obvious systems like marketing platforms, as well as less visible ones like HR tools or finance applications. Discovery may also turn up "shadow IT" programs or applications that have been sending less-that-completely-authorized emails from your domain.
From there, organizations should move through three phases, as described above:
Monitoring (p=none): Collect data, inventory senders, and identify gaps.
Quarantine (p=quarantine): Apply partial enforcement while validating configurations.
Reject (p=reject): Block unauthenticated emails entirely at the SMTP level.
The timeline will vary depending on the complexity of your organization, but don't stop halfway. The monitoring phase should last only a few months before you move on to the quarantining phase.
Misle admits that most organizations don't have the time or expertise to manage this process alone. Partnering with experienced providers can accelerate progress and reduce risk.
"Unless you have a big team and can do this yourself and have a team of three or five people dedicated to this — which I would be surprised if you do, especially more companies, because everybody complains that they don't have time or resources — you will need somebody to guide you and hand-hold you," says Misle. "And finding that trusted partner is the key."
It's equally important to make email security part of regular IT processes. Once enforcement is in place, organizations must establish standard operating procedures for onboarding new email services. Without this, new tools might reintroduce gaps and undo progress.
Finally, recognize the broader impact of inaction. Weak email authentication doesn't just expose your own brand. It also creates downstream risk for your partners, your customers, and the wider supply chain.
"An industry colleague of mine basically coined the term, 'Authentication gives you the deliverability you deserve,' and what that means is it becomes a lot easier for mailbox providers to segregate traffic if they can know who the traffic is coming from," explains Misle. "By making email traffic attributable, you can help cut down spam without affecting false positives."