Get In Touch
June 2018 Archives
It's that time of year - the Summer 2018 State of the Internet / Security: Web Attack report is now live. This new naming schema is just one of the many changes you'll notice if you're a returning reader of quarterly report, and there are more changes coming as we work to bring you insights and intelligence from our data in as useful and timely a way as possible.
Recognizing your brand's need for a customer identity and access management platform is an important milestone to reach, but it's only the first step on the journey to implementation. Inevitably, all CIAM project owners are faced with an extremely important decision: to build or buy their customer identity management platform?
India, while at the cusp of becoming a digital, mobile first country, is also in the middle of evolving content consumption patterns. Hotstar's India Watch Report states that the video consumption in the country has seen a five-fold growth in just one year, with most of this growth is fuelled by mobile. In a country with close to 500 million mobile internet users, an average user spends up to 2.5
From the barista who knows exactly how sweet you like your daily nonfat, caramel macchiato to the CPA who's been doing your taxes for years, personalization is at the core of the services you love and return to. For brands, knowing your customers is the key to engaging them, building loyalty and driving revenue. The ability to understand your brand's consumers -- from anonymous visitors to known and loyal customers
Every year, tens of thousands of mergers and acquisitions (M&A) take place across every industry and vertical. In fact, "In 2017, companies announced over 50,600 transactions with a total value of more than 3.5 trillion USD." Not only is M&A complex from a business sense, it also brings the challenge of merging complex IT infrastructures and applications (which are only getting more complex) as businesses move away from a perimeter
Continuing Changes Welcome to the second blog post for the Summer 2018 State of the Internet / Security. If you've read the SOTI / Security report before, much of what you see here should be familiar, though the time frame we're looking at is the six months from November 2017 to April 2018, instead of the last quarter. The numbers are bigger and give us a better idea of the
Time for a Change The State of the Internet / Security report has been the home for Akamai's research on DDoS, attack traffic and Internet threats for over three years. While the report has evolved and expanded its scope considerably over that time, the content and how it's presented have only seen moderate changes. But as of the Summer 2018 Web Attack report, you'll see significant changes in how we
Written by Meyer Potashman On May 25, 2018, the EU General Data Protection Regulation (GDPR) went into effect. In preparation, Akamai, like every other company that does business with or interacts in any way with individuals in the EU, needed to re-evaluate our approach to data protection and privacy to ensure that we are compliant with the new law. Since GDPR requires that companies evaluate the privacy practices of their
Earlier this year, Akamai mitigated the largest DDoS attack in its history, fueled by a new reflector, memcached. The attack targeted one of our software clients and broke through the 1 Tbps threshold for the first time. Memcached was developed to act as a distributed memory caching system. Since the protocol uses UDP, an insecure protocol, and carries the potential for tremendous amplification, it has the key traits of a
When I first ventured into technology, I wish someone gave me a heads-up about the bevy of acronyms to remember. It feels like every day a new acronym related to technology is formed. It's hard enough remembering names within my family. During Thanksgiving with a full house, I struggle to remember even my own name! When I first heard of SDN - software defined networking, I was still working for
Customer data -- consumers' digital identities -- are the heart of each brand's digital transformation and the driving force behind future innovation. With heightened public awareness and new regulations, the value of customer data and the need to manage this data in a transparent and secure manner are greater than ever.
As reported in an ISOC report last year, IPv6 adoption is now solidly in the "early majority phase" of the technology adoption life cycle by many metrics (well past "innovators" and "early adopters"), with progress beyond that in some areas. Akamai continues to see solid growth in IPv6, including significant traffic peaks during large events, and we continue to find cases where IPv6 outperforms IPv4.
Having knowledge and visibility is just as important as products and technology when it comes to detecting and combating the latest attacks on the Internet. At Akamai, we protect customers from many of the largest and most sophisticated attacks in the world, and we are launching a series of Akamai Security Summits to share what we've learned. This is an opportunity for security professionals to discuss the latest intelligence with