Get In Touch
July 2018 Archives
If your business is like many, your customer's experience is a top priority. In an age of fast paced digital transformation, meeting the needs of a unique global user base while securely delivering quality web based experiences, continues to grow in complexity.
Competitive Differentiation Guide for Financial Services in Digital India We are a young nation 1.3 billion strong, of which just about 500 million are active internet users. Not a small number by any means. We have world's second largest pool of internet users and our online population is larger than the total population of United States of America! However, what we as a nation along with the whole world, really
In 2014, a smart refrigerator had been caught red-handed for spawning over 750,000 spam emails after hijacked by a botnet attack. It is the first documented attack worldwide for Internet of Things to have fallen prey to hackers[i]. A more recent case in the US concerns an internet connected thermostat in an aquarium, which hackers successfully controlled to access the high-roller database of gamblers in a casino[ii].
According to Google over 75% of public websites are accessed over encrypted connections using HTTPS, with the use of HTTP diminishing. As expected, the bad actors are following the crowds, and using HTTPS to hide their activities.
The state of digital transformation in healthcare is sort of a good news/bad news situation. The good news? A recent IDG study revealed that the healthcare sector is one of the leading proponents of digital transformation, trailing only the professional services and financial industries in terms of adopting digital-first strategies.
Gartner predicts that enterprises will spend $96 Billion on cyber security this year, up 8% from their spend in 2017. That's a big chunk of change. To put it into context, that spend is in the same ballpark as the individual GDPs of Venezuela, Sri Lanka and Puerto Rico in 2018.
The underlying protocols of the Internet continue to evolve, and massive events such as the World Cup are a great opportunity to see this in action. A single-match peak for live video streaming of 22.5 Tbps was set on Akamai on Tuesday July 10 during the semi-final in Russia between France and Belgium. Akamai helps deliver World Cup coverage for a large number of broadcasters and subscription-based streaming services, meaning
Akamai employees in Cambridge have started to see some new faces around the office for the summer - 20+ high school juniors to be specific! For the fourth consecutive year, Akamai is partnering with Girls Who Code to host a seven-week long summer immersion program dedicated to closing the gender gap in tech. The girls will learn the basics of programming, robotics, data analysis and visualization by attending classes and
Welcome to the final installment of our investigation into the options of building your own customer IAM solution or purchasing a solution from an enterprise CIAM vendor -- Build vs. Buy. In part two, we detailed many of the inherent challenges of building a customer identity management platform from scratch. In this, the third and final part of this series, we'll look at some of the key factors to consider
Complexity kills productivity. When it comes to enabling application access, enterprises should not have to choose between user experience and complex techniques that ensure application security. Traditionally, perimeter security is built on an assumption that whatever is inside the perimeter is trusted and users can access any corporate application through traditional authentication approaches. That's a big assumption that has become outdated based on the amount of recent attacks and data
Why a Shift Now? Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile and varied, and speed and efficiency are imperative. This has necessitated dynamic, fluid infrastructures and connectivity, as well as unhindered, secure application access -- from anywhere, on any device, at any time. Leaders must remove hurdles to progress, but new initiatives and processes have increased complexity and expanded the attack surface. The past