Blog
Articles, interviews, and useful tips to help you with everything from starting a Premium Anycast DNS project to securing your organization against cyberthreats.
Articles, interviews, and useful tips to help you with everything from starting a Premium Anycast DNS project to securing your organization against cyberthreats.
Phishing and domain-enabled fraud are not “edge cases” in today’s threat landscape - they are a primary entry point. reports that phishing remains the dominant initial intrusion vector in Europe, accounting for 60% of cases in the reporting period covered by the ENISA Threat Landscape 2025. Against that backdrop, most organisations still rely heavily on passive controls: email filtering, URL reputation checks, and third‑party abuse lists. These controls matter - but they do not end the threat. They flag malicious infrastructure; they do not remove it.
Phishing, fraud, malware, and brand impersonation do not scale because attackers are especially clever - they scale because the internet makes it cheap and anonymous to stand up new infrastructure. At the centre of that problem sits domain registration. If domains can be registered globally with minimal identity verification, cybercrime will continue to industrialize faster than defenders can respond. This article examines why anonymous registration has become one of the internet’s most powerful abuse enablers - and what would change if registrars worldwide treated identity verification as a security control, not a formality.
Public sector IT leaders, legal officers, and enterprise decision-makers often face a critical question: does it matter where your domain name registrar is based? In an era of strict data protection laws and rising digital sovereignty concerns, the answer is a resounding yes. Choosing a domain registrar located in the European Union (EU) versus one outside (for example, a US-based provider) can have far-reaching implications for legal compliance, data security, and public trust. This article delves into why EU public entities and enterprises should opt for an EU-based registrar - highlighting the legal risks of foreign jurisdictions and the tangible benefits of keeping your domains under EU oversight.
On 15 January 2026, Sweden's new Cyber Security Act (SFS 2025:1506) will come into force. The Act aims to achieve a high level of cyber security in society and implements the EU's NIS 2 Directive into Swedish law. This means that many organisations will face stricter requirements to improve their protection against cyber threats. The government has emphasised that municipalities and other organisations also need to ‘step up their game’ in their cybersecurity work – the new law will tighten the requirements for these actors. In this article, I summarise the purpose of the law, which public sector organisations are affected, the key obligations (particularly regarding security measures, incident reporting and training) and provide practical guidance ahead of its entry into force.
Google has made email branding more accessible for organisations of all sizes by introducing Common Mark Certificates (CMC) as an alternative to Verified Mark Certificates (VMC) for BIMI implementation. This change allows organisations to display their logo in Gmail inboxes without the need for trademark registration, significantly reducing the cost and complexity of enhanced email security.
Taking down an abusive domain is not as simple as it may appear. You can always report abuse, but this does not always mean the domain will be taken down or preventive actions will be taken to avoid further abuse. An expert ensures the many challenges that can arise in the process are dealt with quickly and efficiently to protect your brand.
Setting up a DMARC policy is not a one-time task. To stay safe from threats in the long-run, organizations need to continuously manage their DMARC policy to ensure all domains are covered and properly protected. Just as organizations continuously change and evolve, so must DMARC.
The impact of AI across industries is undeniable and it will only grow as AI develops further. However, just as AI has the potential to increase the efficiency of many processes and tasks, it can also increase the efficiency and scale of cyberattacks. To stay protected, security must adapt to these evolving threats.
Domain registrars that allow domains to be registered without any kind of identification required make it very easy for cybercriminals to commit crimes in complete anonymity. Unfortunately, there are many of these rogue registrars around and they are endangering businesses and people by not implementing industry standards and best practices.
The NIS2 Directive places new requirements on domain name registrars to get accurate information on registrants in order to minimise the anonymity that enables cybercrime.
BIMI (Brand Indicators for Message Identification) is a way to quickly show email recipients that emails actually originate from your organization. It allows you to add your brand logo to all outgoing emails so recipients can trust that they come from you and not a malicious third party.
Excedo's mission has always been to protect businesses and people online. This requires a holistic approach covering everything from email security and domain management to threat intelligence.
The requirements of the NIS2 Directive are extensive and address many different aspects of digital security, including email security. For organizations to meet the email security standards set by NIS2, they need a correctly configured DMARC policy.
Anycast DNS provides the online resilience required by the NIS2 Directive. It ensures online resources and services are always available even when attacks do happen by providing multiple routing options that make it possible to filter out malicious traffic.
Implementing a DMARC policy for very small organizations is not too complex. Generally, one just needs to ensure it is implemented correctly for a single domain. However, for larger organizations, with multiple domains and email systems, it is much more complicated.
The NIS2 Directive will raise digital security levels across the EU. Although its jurisdiction spans across borders, individual countries have a say in how the requirements will be implemented locally and if they want to go above and beyond the security baseline set by NIS2.
DDoS (Distributed Denial of Service) attacks threaten the availability of essential services and systems worldwide. The first step to protection is to understand what these attacks look like and what vulnerabilities they exploit.
There are many reasons to secure and closely control your digital IP. An important reason is to protect your organization from online brand abuse, where malicious third parties use your brand name to commit fraud.
The default settings of most major email providers have for a long time not been enough to stop email threats from reaching inboxes. But that is now changing with Google and Yahoo's new email security requirements, including the mandatory implementation of DMARC.
A DMARC (Domain-based Message Authentication, Reporting, and Conformance) policy is a key part of organizational email security. It prevents email threats from reaching your employees and users, and it is now a requirement by major email providers like Gmail and Yahoo.
Jan Stenbecks torg 17
164 40 KISTA
SWEDEN