Get In Touch
February 2018 Archives
Managing identities is a central concern of every enterprise. Almost all businesses have employee identity systems in place to manage internal access to different apps and systems within an organization. Sometimes, enterprises will attempt to extend their internal-facing identity management systems -- often called enterprise IAM, workforce IAM, or just IAM -- to their customer-facing apps, devices and web properties. Such an approach underestimates the significant differences between traditional IAM
Nominum, a part of Akamai, recently partnered with Telecoms.com to survey over 1,500 telecom professionals to get a sense of their concerns, initiatives and expectations for 2018. The findings are captured in the report Telecoms.com Annual Industry Survey 2017.
Remember those commercials for excessive cell phone roaming coverage? The ones with clever skits highlighting the end user having no idea that their phone had crossed an invisible border and switched from primary to roaming coverage? Immediately incurring increased costs for calling, texting and data usage that only become visible when you receive your monthly bill?
Akamai is aware of a new DDoS reflection attack vector: UDP-based memcached traffic. Memcached is a tool meant to cache data and reduce strain on heavier data stores, like disk or databases. The protocol allows the server to be queried for information about key value stores and is only intended to be used on systems that are not exposed to the Internet. There is no authentication required with memcached. When
Digital transformation initiatives have the potential to drive customer engagement, open up new revenue streams and improve time to market on new products and services, but the insurance sector has been slower than most industries to adapt.
Carriers see security as a vital component of their five-year strategies and expect to increase spending on security in 2018 according to the Telecoms.com Annual Industry Survey 2017. Is security a good business opportunity for Carriers?
Digital marketing professionals cleave to a deceptively simple maxim: Follow the customer. It's increasingly difficult to adhere to this piece of advice, as consumers engage across a widening variety of channels and become more challenging to track. Social media networks, mobile applications and brand websites are just a few of the many touchpoints that must be accounted for.
Do you remember the days before mobile broadband was commonplace and connection speeds on 2G wireless were barely usable? How often did you seek out a specific location such as a coffee shop or a hotel that offered a free or (more likely) purchasable Wi-Fi connection?
What was your first pet's name? What street did you grow up on? What is your mother's maiden name? What city were you born in? Intended as a convenient and last-ditch workaround for forgotten credentials, security questions that rely on factual data have the unintended consequence of creating an additional attack vector. In addition to providing an additional attack vector if data is compromised, the question forms themselves present
Lighting the flame marks the beginning of PyeongChang, commemorating the ancient Greek myth of Prometheus stealing fire from Zeus, and connecting the games to its predecessors. The lighting ceremony has provided some of the most iconic moments, such as Muhammad Ali lighting the flame in Atlanta in 1996 and Antonio Rebollo shooting a flaming arrow to ignite the cauldron in Barcelona in 1992.
The Internet was designed to share data, but sometimes the paths that enable it are blocked. When it comes to bad actors - that's a good thing. Most companies today have a Data Loss Prevention (DLP) policy to accompany their web proxies and firewalls. Some of them think this is the best way to stop data exfiltration and monitor what is going in and out of their employee's internet devices.
Carriers providing value-added services need to protect both their network infrastructure and their end-customers from internet threats. New threats are constantly emerging but remodeling your security architecture to address each new threat may leave gaps in your security coverage. Bolting-on third party products to fill gaps isolates your core architecture from change but creates complexity and management challenges such as multiple operating consoles and data integration barriers. Are carriers fighting
In an increasingly noisy world, marketers are challenged to craft messages, subject lines, campaigns and strategies to capture their target audience's attention and develop a meaningful brand relationship. While much emphasis is put on creating those catchy subject lines and orchestrating campaigns to capture that attention, having a solid preference management strategy is essential for managing your database, leveraging its value... and complying with GDPR.
This week, Micheal McCollough, Vice President, Global Channels, of Akamai was recognized and named as 2018 Channel Chief by CRN®, a brand of The Channel Company. The executives on this annual list represent top leaders in the IT channel who excel at driving growth and revenue in their organization through channel partners.
By Yohai Einav, Hongliang Liu Background It's been 18 months since Mirai entered our lives, and, unfortunately, we expect it to have a perennial presence in our cyber-world for years to come. If we look at the big picture, all indicators suggest that the Mirai problem (and its descendants) is just going to increase, with the growing number of IoT devices in the world and the improvement in IoT hardware
We have been talking about how it's time to re-evaluate giving full access to the corporate network for some time. In fact, Akamai's Sr. Director of Enterprise Security & Infrastructure Engineering talks about one of his core goals--No VPN--here. Over the last few days, I am sure many teams who are taking the No VPN route are even more thankful. The recent news about yet another patching fire drill--this time
E-commerce has been a disruptive force for retailers and CPG brands alike. With more avenues for engagement than ever before, marketers have difficulty allocating resources and knowing precisely where to place the strongest marketing emphasis.