Akamai Diversity

The Akamai Blog

September 2018 Archives

Gregory Griffiths

Gregory Griffiths

September 28, 2018 8:31 AM

Customer identity management drives loyalty program ...

When done right, a rewards program can establish strong connections with customers, cultivate brand loyalty and even drive sales. A 2017 MIT Sloan Management Review study revealed that companies with high-performing rewards programs were more likely to have customers who were willing to pay more for that brand and who intended to increase the amount and frequency of their spending with that business.

Faraz Siddiqui

Faraz Siddiqui

September 27, 2018 9:14 AM

Zero Trust Security Architectures - Identity Aware P ...

By Faraz Siddiqui and Andrew Terranova This is Part 4 of a 5 part blog series. Jump to Part 1: Introduction Jump to Part 2: Network Micro-Segmentation Jump to Part 3: Software Defined Perimeter Jump to Part 5: Akamai's Approach to Zero Trust

Jim Black

Jim Black

September 26, 2018 8:57 AM

Accelerating Your Zero Trust Security Transformation ...

The basic concepts of zero trust security are relatively simple: trust nothing, verify everything, and maintain consistent controls. But, for CISOs and CIOs charged with transforming their legacy moats and castles architecture to one that allows their enterprises to embrace all of the benefits of zero trust, this is not a simple forklift change. Many enterprises Akamai that consults on zero trust are on transformational journeys, resulting in multi-year projects

Kristen Raybould

Kristen Raybould

September 26, 2018 8:37 AM

Time to Eliminate Traditional VPNs

It is time to stop trusting your endpoints implicitly and reduce the complexity and risk associated with traditional VPN access and flat networks.

Jano van Deventer

Jano van Deventer

September 25, 2018 9:07 AM

Zero Trust Security Architectures - Software Defined ...

By Jano van Deventer and Andrew Terranova This is Part 3 of a 5 part blog series. Jump to Part 1: Introduction Jump to Part 2: Network Micro-Segmentation Jump to Part 4: Identity Aware Proxy Jump to Part 5: Akamai's Approach to Zero Trust Introduction In the first part of this blog series, we covered an overview of zero trust security architecture concepts. The main concept is that trust should

Don Ng

Don Ng

September 21, 2018 9:57 AM

Rise of Credential Stuffing in Asia Pacific and Japa ...

The rise of credential stuffing attacks globally is made possible by the tendency of customers' re-using the same credentials across different websites and attackers' easy access to stolen credential lists.

Andrew Terranova

Andrew Terranova

September 20, 2018 11:38 AM

Zero Trust Security Architectures - Network Micro-Se ...

This is Part 2 of a 5-part blog series. Jump to Part 1: Introduction Jump to Part 3: Software Defined Perimeter Jump to Part 4: Identity Aware Proxy Jump to Part 5: Akamai's Approach to Zero Trust Introduction In the previous part of this blog series, we covered an overview of zero trust security architecture concepts. The main concept is that trust should never be assumed based on where a

Martin McKeay

Martin McKeay

September 19, 2018 5:40 AM

State of the Internet Security - Credential Stuffing

Credential stuffing, and the botnets behind this activity, is the primary focus of the State of the Internet Security Report, Issue 4, 2018. Credential stuffing, the use of botnets to try to login to a site with stolen or randomly created login information, isn't a new phenomenon, but it is one that is having a growing impact, especially on financial services organizations. Our latest report takes a deeper look at

Andrew Terranova

Andrew Terranova

September 18, 2018 7:29 AM

Zero Trust Security Architectures

This introduction is Part 1 of a 5 part blog series. Jump to Part 2: Network Micro-Segmentation Jump to Part 3: Software Defined Perimeter Jump to Part 4: Identity Aware Proxy Jump to Part 5: Akamai's Approach to Zero Trust Introduction Most enterprises today operate hundreds of applications that support core business practices and were developed years ago with the same assumption in mind - that anyone inside the perimeter

Randy D'Souza

Randy D'Souza

September 14, 2018 2:01 PM

DNS is a Unique (and Necessary) Security Control

Like many other security professionals, you have been reviewing your security stack, reading up on the latest security trends, and have perhaps recently attended Info-Sec, RSA, Black Hat or some other relevant conference. Along the way, you may have seen messaging for recursive DNS (rDNS) as a security layer. However, it's hard for you to believe DNS is an effective security control, as you know it is a lookup service

Chris Wraight

Chris Wraight

September 13, 2018 11:25 AM

Mobile Device Access Predicted to Surpass Desktop Th ...

By Chris Wraight and Charles Choe The U.S. back-to-school shopping period is a hectic time when parents are busy purchasing items for their children such as pencils, books, electronics and new clothes; back-to-college is just as important and is now tracked separately. According to the National Retail Foundation, the 2018 total back-to-school and back-to-college spending for K-12 schools and college is projected to reach a combined $82.8 billion (back-to-school $27.5b

Anthony Larkin

Anthony Larkin

September 12, 2018 9:23 AM

The holiday shopping surge is going global: How to k ...

Big promotional days like Black Friday and Cyber Monday that got their start in the U.S. are now major online shopping days for consumers around the world. Here are some tips for catering to global shoppers, and preparing for the surge of traffic to retail websites from all sources.

Chris Wraight

Chris Wraight

September 12, 2018 9:19 AM

Mobile matters: How to ready your apps for the holid ...

https://www.digitalcommerce360.com/2018/08/30/mobile-matters-how-to-ready-your-apps-for-the-holiday-shopping-spike/ While more consumers now shop on smartphones, retailers have a lot of work to do to make mobile shopping easy. Developers must account for the wide variety of mobile hardware and software, take into account how consumers use their phones in stores and ensure easy checkout.

Gregory Griffiths

Gregory Griffiths

September 6, 2018 11:08 AM

Case Study: How to Balance Compliance Demands with L ...

Adhering to the General Data Protection Regulation and other consumer protection regulations is a challenge tackled by consumer product brands all over the world. How do you follow these guidelines on how customer data is gathered and leveraged without hamstringing your customer loyalty program and engagement efforts?

John Neystadt

John Neystadt

September 6, 2018 9:49 AM

Getting the most out of your branch local connection

In our global world of business, organizations often have multiple branch offices spanning every country. Some of these branches are quite large with their own IT infrastructure and personnel, while some are very small with just a few employees. In the past, these branch offices were connected to the main office using MPLS or other connectivity in a hub-and-spoke topology. Today, however, many enterprises are adding local Internet break-outs to

Ashley Adelman

Ashley Adelman

September 6, 2018 9:26 AM

5 Fundamentals for Enterprise CIAM

Customer identity and access management (CIAM) is a strategic necessity for businesses to give consumers seamless, personalized omnichannel brand experiences that drive revenue. However, not all customer identity and access management solutions are equal, and enterprises must critically evaluate their identity management strategy to succeed.

Chris Wraight

Chris Wraight

September 4, 2018 9:12 AM

Three tips to prepare for peak traffic

Peak shopping season is just around the corner. Is your website prepared? Some websites slow down, and others simply crash, driving users (and revenue) away. Your website needs to accommodate a multitude of devices that will be accessing it, along with the potential for malicious attacks such as Bots and DDoS.

Anthony Larkin

Anthony Larkin

September 4, 2018 9:03 AM

You bet your mobile app consumers are willing to pay ...

For almost 10 years, there has been a debate over mobile app versus mobile web. Which strategy is right for your business and will consumers really ever buy something with a mobile device? Some of these questions have been clearly answered with time, but some aspects of the debate continue.