Get In Touch
As a security professional, no one knows better than you that the attack surface is shifting and continues to expand across an ever-widening area. Our interconnected digital lives are wreaking havoc with the idea of "the perimeter." As digital attacks continue to grow in size and volume, and are increasingly targeted, knowing what defense posture you need to deploy to stay safe is being redefined right before your eyes. That's
Introduction The encoder qualification program was created to improve the process for vendors that wish to align themselves with Akamai network specific requirements. It is also intended to , mitigate the risk of encoder issues before using in production. A formal process is being introduced to fast forward the qualification testing cycle.
Everyone and everything on the Internet depends on the Domain Name System (DNS) being functional. The DNS has been a common vector for attacks in recent years, and 2019 seems to be no different. Many of these attacks have goals far more sinister than simply taking a company offline or defacing a website; reported attacks include redirecting some or all of an organization's domain to gain access to protected
Live streaming has grown immensely over the years. Today, we can watch live events from all around the world via our laptops, mobile phones, set-top-boxes, Smart TVs, and other connected devices.
Written by Jon Reed & Barry Greene DNS Flag Day is an industry event that promotes the adoption of the most up-to-date DNS features and ensures that non-standards-compliant servers don't negatively impact the global performance of the Internet. The 2019 DNS Flag Day will remove a number of workarounds regarding servers that do not fully support the EDNS0 (RFC 6891) extensions.
There are two types of companies: Those who have been hacked, and those who don't yet know they have been hacked1 With data breaches frequently making the news and causing panic among network administrators, the above statement by former Cisco boss John Chambers in 2015 certainly doesn't seem far-fetched. I don't remember a week in 2018 going by where I wasn't learning of a data breach and how sophisticated the
Is it too late to still say "Happy New Year?" We don't think so. We're kicking off 2019 with our first issue of the State of the Internet / Security.
Application Servers are implemented as a means of providing services and making resources available to users. However, any server connected to the Internet is inevitably targeted by malicious users using open listening ports. There are millions of these ports on the Internet, which means there is plenty of opportunity to exploit these open services.
As mentioned in the 2018 Year in Review State of the Internet / Security report, trends in DDoS are remarkably stable. The size of the largest attacks have grown by approximately 6% on an annual basis, with occasional outliers like the Mirai botnet. The median size of attacks has been much more changeable, with a cyclic growth and retreat on a two year basis. Unluckily, the ebb of DDoS is