Akamai Diversity

The Akamai Blog

Sam Preston

Sam Preston

March 9, 2021 11:30 AM

Finding the Best Servers to Answer Queries -- Edge D ...

TL;DR IP Anycast is a network addressing and routing methodology that allows IP addresses to be announced from multiple points on the internet With the proper implementation, Anycast can reduce DNS RTTs and offer innate DDoS protection Akamai's authoritative name service, Edge DNS, combines global scale with strategic network advertisements to optimize performance and reliability Domain owners can further promote a performant DNS posture by maximizing record TTLs and enabling

Jim Black

Jim Black

March 9, 2021 9:00 AM

Is MFA a Security Illusion?

A recent Akamai Security blog post, Massive Campaign Targeting UK Banks Bypassing 2FA, written by my colleague Or Katz, is a great insight into how attackers used very simple techniques to bypass two-factor (2FA) authentication security to obtain access to U.K. consumers' bank accounts.

Hen Tzaban

Hen Tzaban

March 3, 2021 9:00 AM

Compromised enterprise devices detection based on ab ...

Recently, many reports of incidents have been making headlines, proving that no business or industry is immune to advanced threat actors. Applying user and entity behavior analytics (UEBA) for the challenging task of the detection of compromised devices over time can play a critical role in enterprises' defense mechanisms.

Chinedu Egonu

Chinedu Egonu

February 16, 2021 9:00 AM

SolarWinds Hack and the Case of DNS Security

It's not news that some of the top government agencies and companies in the world were victims of the SolarWinds attack. At this point, I can say it's the reason I didn't have a smoother transition back into work-life following a long vacation. As I understand it, the breaches happened after malicious code was inserted into a software patch that was downloaded by the companies and agencies. The installation of

Jim Black

Jim Black

February 9, 2021 9:00 AM

Phishing: Holiday Season Attacks on the Rise

Overview Phishing continues to be a major attack vector, and it's surprising just how many security incidents and breaches start with an employee clicking on a link in a carefully crafted phishing email (and sometimes doing the same with a not-so-well crafted phishing email -- see this example).

Jonathan Zarkower

Jonathan Zarkower

January 28, 2021 9:00 AM

Distinguishing Among DNS Services Part 3: Investment ...

This is Part 3 of a 3-part blog series highlighting some of the distinguishing aspects of Akamai's authoritative DNS services, Edge DNS and Global Traffic Management. Part 1 focused on Akamai's DNS platform and what sets it apart. Part 2 focused on the economics of authoritative DNS pricing models and how Akamai's approach is unique. In this final post in the series, we look at a less visible characteristic, which

Jim Black

Jim Black

January 12, 2021 9:00 AM

Emotet: A Year in the Life of a Malware

Overview Emotet malware has been around since 2014, but 2020 saw a resurgence of attacks. In September 2020, Emotet affected 14% of organizations worldwide. So, what is Emotet? And why is it so dangerous?

Bruce Van Nice

Bruce Van Nice

December 28, 2020 9:00 AM

Smart DNS for the New Network Edge: Emerging Require ...

This blog post -- the fourth in a series -- will discuss how smart DNS resolvers can enhance ongoing ISP and MNO network transformation efforts, such as the transition to 5G, better integration of Wi-Fi, and new network designs that optimize the edge to improve service delivery and network efficiency.

Pavel Despot

Pavel Despot

December 22, 2020 9:00 AM

How the Edge Improves Microservices

Microservice architecture has transformed the way we develop and operate our applications. Microservices aren't a technology or a programming language. Instead, they create a structure for designing and building applications based on the idea that the individual functions of a website should operate independently. From this simple concept comes a multitude of benefits including: