Akamai Diversity

The Akamai Blog

Tale Lawrence

Tale Lawrence

September 6, 2017 6:45 AM

Akamai's DNS Contribution to Internet Resiliency

Background Akamai Technologies recently contributed its "Serve Stale" DNS algorithm to Version 9 of the Internet Systems Consortium's (ISC) Berkeley Internet Name Domain (BIND) open source Domain Name System (DNS) project. As the Internet's most widely used DNS implementation, BIND operates ubiquitously throughout the Internet. The ongoing availability of answers from BIND servers is a critical element for the ongoing availability of the Internet for many users.

Yohai Einav

Yohai Einav

August 31, 2017 11:12 AM

Infographic: How Botnets Work

With IoT on the rise, consumers are rightfully afraid of privacy invasions. But, infected devices can serve far more sinister purposes. Herewith, we breakdown the ways a botnet works.

AkamAI Research

AkamAI Research

August 24, 2017 11:18 AM

Take a Bite out of Cybercrime by Analyzing New Core ...

We just conducted our monthly Cyber Insider discussion, this time focusing on what deep analysis of new core domains reveals about new threats and zero-day malware. As a company that processes 1.7 trillion DNS queries a day and analyzes 100 billion queries a day from our global service provider customers, we are in a unique position to gain insights.

Barry Greene

Barry Greene

August 23, 2017 1:43 PM

What makes a good "DNS Blacklist"? - Part 2

In "What makes a good 'DNS Blacklist'? - Part 1", we explored the background and factors that have gone into Akamai's thinking behind New security products like Enterprise Threat Protect (ETP). This article continues with a list of factors and questions to ask any DNS Threat Feed providers, including Akamai. What should enterprises look for in the DNS Threat Policies? DNS Threat Policies are more than a DNS Blacklist. The

Barry Greene

Barry Greene

August 22, 2017 1:22 PM

What makes a good "DNS Blacklist"? - Part 1

Reflections on Modern Actionable Threat Intelligence used to turn a DNS Resolver into a Critical Security Tool Akamai has just launched the Enterprise Threat Protection (ETP) platform. ETP is built on Akamai's global AnswerX Cloud that now reaches 28 countries and is expanding to new countries every month. As a new player in Cloud DNS resolver services, competitors will ask "why Akamai?" or "what gives Akamai the knowledge and capacity

Ralf Weber

Ralf Weber

August 10, 2017 12:22 PM

A Rich Policy Language for the DNS

For many years ISPs in certain parts of the world have been required by their regulators/governments to redirect certain websites that were deemed malicious or suspicious. DNS offered a straightforward way to do this; and Nominum, now part of Akamai, is a DNS company, developed an early mechanism using a DNS zone file that made it simple for ISPs to comply. The technology was originally named "Malicious Domain Redirection" (MDR),

Yohai Einav

Yohai Einav

July 26, 2017 12:38 PM

Petya/NotPetya: Ransomware Attacks in a New Form, bu ...

Ransomware has changed a lot since it was introduced back in 1989 by Dr. Joseph Popp, where 20,000 floppy disks were distributed via snail mail. The malware hid files on a victim's hard drive and encrypted only the file names, rather than the entire files themselves. As one might assume, the entire remediation process was manual, rather than digital. Popp's program asked victims to print the ransom note and send

Akamai

Akamai

July 24, 2017 1:09 PM

TalkTalk Receives #1 Rating in the UK for Fibre Broa ...

Congratulations to TalkTalk, who were just named the number one provider in the UK for Fibre Broadband response times by the SamKnows industry benchmark. How did they accomplish this? With the support of Nominum's, now part of Akamai, carrier-class DNS software solution, CacheServe.

Or Katz

Or Katz

July 12, 2017 2:11 PM

The Slippery Slope Starts with "Get 2 Free Airline T ...

Written by Or Katz and Raviv Perets A widespread phishing scam that offers free airline tickets has been spotted in the wild by Akamai's Enterprise Threat Protector (ETP) security research team. The campaign uses a number of social engineering techniques to trick people into providing their private information. When someone clicks on the link in the phishing email, they are taken to a dedicated website that tells them they have