Akamai Diversity

The Akamai Blog

April 2017 Archives

Meg Grady-Troia

Meg Grady-Troia

April 28, 2017 12:17 PM

Low Risk Threat: DDoS Extortion Letters

Summary Adversaries calling themselves the Lizard Squad have been sending businesses extortion letters, demanding payment in bitcoin to prevent a Distributed Denial of Service (DDoS) or other attack against their applications. These letters have been sent to businesses across the globe and across industries for several years, with little follow-through. These letters appear to come from multiple groups including Lizard Squad, the Armada Collective, and DD4BC, though in many case

Akhil Jayaprakash

Akhil Jayaprakash

April 27, 2017 12:12 PM

The State of Mobile App Performance

In our previous blog, we saw how a new generation of users are increasing the expectations of a mobile app like never before and identified the three key success criteria for mobile apps: 1) increase customer conversions, 2) drive installs and 3) increase customer loyalty. For this blog we profiled the Top 100 retail apps in the app store to explain how you can leverage Akamai features to meet the

Lorenz Jakober

Lorenz Jakober

April 26, 2017 12:40 PM

Recursive DNS - The Achilles Heel Of Advanced Threat ...

We all know what happens whenever anyone or anything tries to access a resource on the Internet. It all starts with a DNS request that translates a URL (www.akamai.com) into an IP address (104.97.77.24): Now if we dive a little deeper into the DNS request flow we can see the requester make a request to the recursive DNS infrastructure of either their ISP or their enterprise. In other words recursive

Yohai Einav

Yohai Einav

April 26, 2017 12:04 PM

Understanding the Cyberattack Ladder and the Three K ...

Inside the Mind of a CybercriminalThe rise of open source malware, IoT-based threats, and criminal services-for-hire is fomenting a new era in cybercrime. While global cybercrime is expanding and cybercriminals are stuffing their bank accounts, individuals and businesses (especially SMBs) are directly impacted. Many worry about the safety and security of their online experiences and what communication service providers (CSPs) are doing to protect them.

Akamai

Akamai

April 25, 2017 12:11 PM

Secure (and Simple) SharePoint Remote Access

SharePoint, Microsoft's 16-year-old flagship file storage and collaboration product, is used by over 200 million worldwide users. Likened to a Swiss Army knife, SharePoint performs so many functions that it has become an integral part of most enterprise IT fabrics. Of course, it is not perfect - no product is. And like many incumbent products, there are always new challengers ready to deliver advanced feature and performance capabilities. Google Apps

Akamai

Akamai

April 21, 2017 9:49 AM

New findings: The State of Online Retail Performance ...

I'm extremely excited to announce the release of our very first State of Online Retail Performance report. This report is a semi-annual analysis of the intersection of performance metrics from three different perspectives: IT, business, and user experience. It's always a thrill to release new research into the wild, and I'm extra thrilled about this particular project. As our first piece of new research to be released under the

Chris Nicholson

Chris Nicholson

April 20, 2017 5:38 AM

The 'Audience of You' at NAB

It's all about the "audience of you" as Akamai gears up for next week's 2017 NAB Show in Las Vegas. With that phrase, we're talking about helping to deliver the best possible experiences for each and every OTT video viewer. It's not an easy thing to do, but we're demonstrating a host of new products and technology that can help make sure consumers enjoy nothing less than flawless viewing ...

Lorenz Jakober

Lorenz Jakober

April 3, 2017 8:44 AM

Why moats and castles belong in the past

We are all familiar with the enterprise security approach of treating an organization like a castle, and protecting it with a moat. Moats have been used for perimeter defense since ancient Egypt. While the moat and castle enterprise security approach has worked well in the past it is starting to show its age.