Akamai Diversity

The Akamai Blog

Recently by Charlie Gero

Charlie Gero

Charlie Gero

June 7, 2021 12:00 PM

Trusting Locations Bites Us Yet Again

Recently, Microsoft announced the discovery of yet another attack being launched by the now infamous Nobelium group, which has been responsible for numerous successful attacks, including the widespread SolarWinds breach in 2020. Thankfully, this latest attempt was not as impactful as those in the past. It was discovered early on and largely mitigated through several protections. However, as I read through the security briefing, two things stand out. First, Nobelium

Charlie Gero

Charlie Gero

March 24, 2021 9:00 AM

Authentication: Lessons Learned from Microsoft Excha ...

The past month has been a very dynamic time in the world of security for hackers and threat researchers, but it has been an extended nightmare for CSOs responsible for securing their enterprise networks. For starters, on-premise Microsoft Exchange servers were attacked in droves after a set of zero-day vulnerabilities were discovered, resulting in widespread infiltration of hundreds of thousands of organizations. These vulnerabilities allow malicious actors to remotely control

Charlie Gero

Charlie Gero

February 1, 2021 8:00 AM

Akamai + Fingerbank: How an open source community ca ...

Isn't it amazing how seemingly simple decisions can have far-reaching effects? When the Inverse team in Montreal took over PacketFence in 2008, it was an open source (OS) solution. They recognized the inherent value in keeping it as such. In so doing, they didn't just launch a product--they created a global community. By making a trusted network access control (NAC) solution freely available, they planted the seeds of an ever-growing

Charlie Gero

Charlie Gero

March 8, 2016 10:49 AM

Enterprise Security - SSL/TLS Primer Part 2 - Public ...

Join me over the next few posts as I talk about how to provide fast, reliable, and secure applications in the branch while protecting end-users and promoting a transparent and open Internet. In Enterprise Security - SSL/TLS Primer Part 1 - Data Encryption I covered the fundamentals of data encryption. For part two we will cover certificates. Let's start with the basics.

Charlie Gero

Charlie Gero

March 1, 2016 1:33 PM

Enterprise Security - SSL/TLS Primer Part 1 - Data E ...

Join me over the next few posts as I talk about how to provide fast, reliable, and secure applications in the branch while protecting end-users and promoting a transparent and open Internet. Let's start with the basics. So what is SSL/TLS & how does it work?