Level up your Twilio API skills in TwilioQuest, an educational game for Mac, Windows, and Linux. Download Now
Build the future of communications.
Start building for free
  • By Len Shneyder
    The Google BIMI Pilot Is Here! Google BIMI Pilot

    In January of this year, Twilio became a part of the Authindicators working group, joining numerous other entities in the email ecosystem including Google, Yahoo!, Comcast, Valimail, and Validity in an effort to bring Brand Indicators for Message Identification (BIMI) to life. BIMI is a standard that attempts to increase the wide adoption of email authentication in the ecosystem while simultaneously providing senders with a way to provide their customers with a more immersive experience.

    With two of the three biggest North American free mailbox providers, as well as one of the largest ISP's committing to supporting the development of the standard, the importance of BIMI is abundantly clear and we wanted to ensure that we brought BIMI to the community of senders that view email as a crucial communication tool. This couldn’t be more true today as the global community struggles with the ongoing effects of the COVID-19 …

    Read More
  • By Len Shneyder
    Protecting Inboxes is a Civic Duty Inbox Protection Rate Q4 2019

    Since the 2016 elections there has been a critical focus on the mechanisms we use to engage with the political process, discuss issues, read news, and ultimately, engage in the constitutionally enshrined activity of voting. Although email is tangential to the voting process, it is nonetheless a critical component of our everyday lives, both personal and professional, and often the first salvo in a cyber attack. Phishing is of course a social engineered attack via email, however the ramifications of a successful phishing attack can be far reaching and infinitely devastating. David Ingram put it best in a recent article focused on phishing attacks against Burisma and Democratic Presidential Candidates: Cracking computer systems is hard. Cracking people? Not as hard.” Presidential candidates have been warned about not only financial scams but the attempts of state sponsored hackers seeking to derail the 2020 elections.

    In 2016 we saw how …

    Read More
  • By Len Shneyder
    Efforts Ramp Up to Strengthen Wanted Campaign Communications Efforts Ramp Up

    Election security means different things to different people. Cyber security personnel may think of election security as locking down access to voting machines. Other experts in the field may focus their attention on securing systems that are critical to the day to day operations of organizing elections, such as email and other communication channels, as a means of shrinking the attack surface of our elections. Whatever the focus, one thing rings absolutely true: maintaining free, fair and credible elections in democracies around the world is absolutely key to ensuring the survival of those democracies. With that in mind we can all agree that election security is crucial and complicated given the inherent complexities that lay across every aspect of communications, systems, hardware and the software that powers today’s internet.

    Twilio sits in an interesting spot in the complex and layered framework of elections in the United States. As the world’s …

    Read More
  • By Len Shneyder
    2019 Holiday Email Metrics 2019 Holiday Email Analytics

    The holidays are a distant memory for some—for others they’re a big looming target on the horizon 10 months from now. Whatever perspective you take, the truth of the matter is that every iteration of the holiday bonanza is an opportunity to experiment and learn. And yes, capitalize on the growing opportunity to engage and convert new and existing customers.

    The Big Picture

    I’ve said it before and I’ll say it again: email is a highly instrumented channel that allows senders to benchmark their performance across numerous data points and vectors. In 2019 Twilio SendGrid processed over 4.2 billion emails on Black Friday and over 4.3 billion emails on Cyber Monday. The trend chart below shows you the growth of our platform from SendGrid’s inception and although it’s not causal, the growth of the holiday shopping event which reaches new highs with every trip around the sun. Chart

    The reason for …

    Read More
  • By Len Shneyder
    Twilio SendGrid Joins The Authindicators Working Group Twilio SendGrid joins the Authindicators Working Group

    The Email Renaissance

    The email inbox has been undergoing a renaissance for the better part of a decade. At first the changes were small and a matter of necessity. Then iOS and Android came along which meant that the inbox was no longer just on our laptops but in everyone’s pocket. Email had to adapt to new platforms, formats and ways of being used and consumed. Last year Google announced the general availability of AMP for Email. The new standard is being adopted by other mailbox providers solidifying the fact that the inbox is becoming more interactive.

    These new form factors, interactivity and functionality are all being built with the understanding that the inboxes of tomorrow must be more secure than ever before. Email authentication is quickly becoming not only a best practice but a prerequisite for senders hoping to engage their recipients in new and unique ways.

    BIMI …

    Read More
  • By Len Shneyder
    TWILIO STUDY: Presidential Campaigns Are Not Hitting Their Mark With Their Email Outreach Presidential Campaign Email Study.png

    If it feels like today’s election season has neither an end, nor a beginning, you may not be far off the mark. The 2020 presidential campaign kicked off barely minutes after the 2018 midterm elections. Between the start of 2019 through this fall, the field of presidential candidates plus the incumbent swelled to 26 individuals running for the top job in the country. As we head into Q4, the field has narrowed a bit on the Democratic side. However, the one thing that has remained constant since the beginning is that these candidates use email to engage potential voters, raise campaign contributions and educate subscribers about their platforms and messages.

    Between July and August of 2019 we decided to take a close look at how political campaigns leverage email as part of their digital strategy. Our methodology was simple but effective given the diverse group of candidates. We set up …

    Read More
  • By Len Shneyder
    Everything You Need to Know About SHAKEN/STIR Right Now Developer 101 SHAKEN/STIR

    If you’re like the rest of us, your phone rings periodically throughout the day receiving calls from numbers that look suspiciously close to your own phone number, or sometimes it is your phone number calling you. Don’t worry, you’re not seeing things, this is robocalling fraudsters trying their darndest to get you to pick up your phone. You’ve most likely blocked many of these numbers, installed apps like Hiya, YoumailNomorobo or Robokiller and considered throwing your phone against the wall. We get it, we’ve all been there. However change is on the horizon and it’s coming in the form of SHAKEN/STIR.

    The Phone Network of Yesterday

    How did we get here?

    Robocalls didn’t just suddenly appear one day. Robocalls are the byproduct of the evolution of telephony that has been weaponized by scammers to defraud vulnerable populations. When our parents grew up, telephony was highly regulated and people answered the phone because …

    Read More
  • By Len Shneyder
    Your Phone, Your Call - Part II - Whatever Happened to Caller ID callerID Header

    A version of this originally appeared on Marketing Land

    Way back when the Internet was young, and early internet surfers were using 3600 baud modems to launch themselves via copper into the Netscape driven cyberverse, trust and identity were not really as important as they are today. Flash forward to today: Identity and reputation both play a critical role for re-establishing trust across digital communications. Who calls or emails us and their credibility (whether the caller or sender is someone who’s credible enough and worth the time of the recipient to respond) are key elements that help us decide whether to take a call, open an email or respond to an SMS. Precautions, such as two factor authentication, is based on the fact that we can’t trust just one form of identity. I hate to sound like an alarmist, but the Internet can be a scary place. This is why …

    Read More
  • By Len Shneyder
    Protecting Ever More Inboxes With a 99.99% Inbox Protection Rate in Q2 2019 q2-2019-inbox-protection.png

    This article was first posted on the Twilio SendGrid Blog.

    Twilio SendGrid’s 80,000+ paying customers generate more than 50 billion emails per month. When we reviewed the volume of email we process on behalf of our global customer base, it became apparent that we touch—on a rolling 90-day basis—half the world’s email users.

    A footprint that massive only happens when compliance and the overall security of the world’s inboxes is addressed in a scalable and performant manner. In Q2 of 2019, Twilio SendGrid achieved a 99.99% Inbox Protection Rate.

    Today, we’re excited to announce an improvement of two 100th’s of a percent, thus achieving four 9’s of protection for the world’s email ecosystem.

    This improvement is significant.

    When you consider the devastating effects that phishing attacks can have on an individual’s financial records and identity, those effects are vastly amplified when spear phishing is employed to compromise a businesses’ …

    Read More
  • By Len Shneyder
    A 2019 SIGNAL Conversation on Anti-Spoofing in Voice & Email signal-2019-anti-spoofing-email-voice.png

    Recently, at Twilio’s SIGNAL 2019 Conference in San Francisco my colleague Christer Fahlgren and I had a chance to lead an on stage conversation with those companies and organizations that have played an active role in shaping Internet standards designed to fight calling and email abuse on a massive scale.

    The wildly popular adoption and proliferation of email can be credited for helping grow the Internet. The only thing more staggering than the proliferation of email as it ascended to become the provider of the fundamental and most universal digital identifier is the degree to which this open platform framework has been abused. If imitation is the sincerest form of flattery then mass exploits are certainly an acknowledgment of a technology’s ability to connect the world.

    Email in the early 2000’s was like Times Square in the late 70’s, a terrifying place. Unsubscribe links were often used as beacons by …

    Read More
  • Newer
    Older
    Sign up and start building
    Not ready yet? Talk to an expert.