Get In Touch
Data scientists put in a tireless amount of work tracking cybercriminals--from specific individuals to entire organizations--looking at their behavior and the methods through which they attempt to compromise data. Because DNS is a ubiquitous protocol that's used for most internet interactions, it also provides fertile ground for cybercriminals to launch malware. Nominum, now part of Akamai, Data Science examines massive volumes of DNS data--100 billion queries daily--to detect anomalies and
For citizens of the most advanced economies, it is hard to conceptualize what being entirely cut off from the Internet would look like, let alone how it could actually happen. Is it as simple as flipping a kill switch or pressing an 'Off' button? Though unlikely in countries like the United States that have numerous independently operated providers and redundant Internet infrastructure, total shutdowns are still possible in geographies where
This story has been told thousands of times before - a botnet is born, a botnet goes down, a botnet tries to get its bots back together. But the story of Necurs is unique.
In his latest white paper, "Innovation in Communication Services: Breaking with the Past without Waiting for the Future," Patrick Donegan of Heavy Reading discusses a key aspect of digital transformation: the ability to offer innovative services that enhance the subscriber experience. More specifically, he discusses the need for personalized services--as well as why DNS technology is an ideal way to achieve personalization in new service offerings.
When we published our recent Locky blog post, we didn't expect it to have such a quick effect: a day after the post went online, this notorious ransomware went offline. We immediately figured it out - a blog post can change the world.
We just released a new whitepaper outlining the upcoming types of cyberthreats and malicious activity affecting digital consumers, and how organizations and operators can address them. Below is an excerpt.
Locky is a new cyberthreat that has received a lot of attention in security circles over the last few months because it has been unusually successful. Locky is advanced ransomware that encrypts a person's files and holds them for ransom. It uses a number of different technologies to avoid being detected or blocked and takes great care to hide its path back to the attackers. The code is obfuscated to
There's been a lot of buzz about digital transformation. For me, the transformation is really about service providers delighting their customers. The other day I was speaking with a provider in EMEA that recently did a pilot with our Reach subscriber communications solution to up-sell higher data usage options to subscribers who are at 80% of bandwidth. We see this use case every day, especially as video streaming usage is
One of the important, and more interesting, use cases of Network Function Virtualization (NFV) and Software Defined Networking (SDN) is CORD. CORD stands for Central Office Re-architected as Datacenter. It "combines NFV, SDN, and the elasticity of commodity clouds to bring datacenter economics and cloud agility to the Telco Central Office" according to the CORD website. It is an initiative that was started by AT&T and Open Networking Lab (ON.Lab)