Get In Touch
From its beginnings as a replacement for a centralized database, the Domain Name System (DNS) has evolved into a dynamic, highly distributed, question-answer protocol. The proverbial "phone book of the internet" has increased in complexity and scale alongside the rapid growth of the World Wide Web. One primary example is Domain Name System Security Extensions (DNSSEC). The founding architects of DNS did not include any inherent security protections for the
[Updated March 4, 2020 5:23 PM] Consider Addressing Delegation Servers with Varying Network Routes Written by: Jim Gilbert and Barry Greene Don't Forget DNS Similar to diverse workforces performing at a higher level, diverse network service deployments perform at a higher level that is increasingly important as the Internet continues to augment our reality. Akamai has 20 years of edge service deployment experience. Akamai's Intelligent Edge has proven that the
Be real. A Communications Service Provider's (CSP's) customer will not use their home to attack the Domain Name System (DNS). They might as well unplug from the Internet. Yet, customers get infected, CPEs get violated, and miscreants all over the Internet reflect attacks off CSP customers to attack others. This abuse happens every day. It is part of the "noise" of the Internet. It is also a major threat to
Ensure Quality of Experience and Readiness with CDN Capacity Overflow Have you ever planned and launched a system with painstaking detail and, at some point in time, something unexpected breaks the system? An unexpected event might be an unanticipated scenario (a bug!) or user adoption beyond expectations (hello Fortnite!). These events can lead to gut-wrenching times when a fix to address the event takes a long time even though the
Twenty years ago it would be common to have multiple data centers load balanced with specialized devices. The applications in multiple data centers would use the Domain Name System (DNS) to look up the application destination. The DNS system would be set up to with multiple data center locations. This would "round robin" the results between the data centers. If you have four data centers, the customers would get "round-robined"
[Updated March 4, 2020 10:09 PM] Everyone and everything on the Internet depends on the Domain Name System (DNS) being functional. The DNS has been a common vector for attacks in recent years, and 2019 seems to be no different. Many of these attacks have goals far more sinister than simply taking a company offline or defacing a website; reported attacks include redirecting some or all of an organization's domain
Written by Jon Reed & Barry Greene DNS Flag Day is an industry event that promotes the adoption of the most up-to-date DNS features and ensures that non-standards-compliant servers don't negatively impact the global performance of the Internet. The 2019 DNS Flag Day will remove a number of workarounds regarding servers that do not fully support the EDNS0 (RFC 6891) extensions.
Domain Name Consolidation The market and marketing of Web property domain names is changing. Companies prefer to promote top level domains (TLDs), have the option of selecting brand-relevant domain extensions (e.g. SaaS.com), and no longer need country-relevant domains to optimize search engine result rankings. This provides an opportunity to reduce "domain name fragementation" but also presents business and technical challenges if a migration is required from the active use of
Yes, we can minimize the BGP Hijacking Risk Every day we see something new about the global security threat. It is hard to keep track of all the various ways your network can be attacked. But there are some threat-vectors which need particular attention. "Did you know that a threat-actor with 20 BGP speaking routers can cause massive disruption in telecommunications all over the world?" "Did you know that someone