Akamai Diversity

The Akamai Blog

Jim Black

Jim Black

September 26, 2019 11:00 AM

The Phishing Industry

As I mentioned in my previous blog post, phishing attacks are now being created and executed on an industrial scale. Malicious actors are increasingly using highly sophisticated off-the-shelf phishing kits that allow them to deliver very targeted, short-lived attacks. These campaigns direct victims to a phishing web page that's an exact copy of a consumer or enterprise brand's site. This has lowered the barrier to entry for launching phishing attacks.

Jim Black

Jim Black

September 18, 2019 3:30 PM

This Isn't the Phishing Your First Boss Knew

Phishing has been around for nearly as long as email has, and the perception that phishing tactics have not evolved persists. Many people believe we are still in the era of the easy-to-spot "Nigerian prince" emails, shown below. Underneath that, we see a highly creative, yet not any more technically sophisticated, "Nigerian astronaut" ruse.

Maria Ramirez

Maria Ramirez

September 5, 2019 11:00 AM

DNS Protection: A "Must" in Security Solutions for a ...

Domain name system (DNS) services are often a point of vulnerability for businesses, so DNS security has become a growing concern for many of them.

Lorenz Jakober

Lorenz Jakober

August 7, 2019 11:30 AM

Trust As The Foundation Of Security

Our customers are moving more workloads to the cloud. No surprise there. The siren song of agility, scale, and cost savings can't be resisted. But as we highlighted earlier, security fundamentals are key to a successful cloud migration. In fact, we also shared marketectures to successfully migrate apps to the cloud and the top best practices for securing cloud workloads. While there are plenty of areas to dive into across

Jim Black

Jim Black

March 22, 2019 9:00 AM

Securing Your Direct Internet Access Connections

With the rapid uptake in SaaS applications and the ease of moving enterprise applications from the data center to the cloud, many global companies are transforming the way they connect branch offices. In the past, the conventional approach was to connect all of your locations over an MPLS Wide Area Network (WAN) and then send all branch traffic over that to a regional HQ or even a single global HQ.

Chinedu Egonu

Chinedu Egonu

January 30, 2019 11:16 AM

Protect Your Network From Malware

There are two types of companies: Those who have been hacked, and those who don't yet know they have been hacked1 With data breaches frequently making the news and causing panic among network administrators, the above statement by former Cisco boss John Chambers in 2015 certainly doesn't seem far-fetched. I don't remember a week in 2018 going by where I wasn't learning of a data breach and how sophisticated the

Jim Black

Jim Black

December 20, 2018 2:37 PM

New Delegated Administration feature in Enterprise T ...

Managing security configurations for large organizations with locations scattered around the world can be challenging. Likewise, some businesses have multiple operating divisions that are separate entities but all use the same IT infrastructure. As an IT leader, you likely want to have consistency in baseline security and acceptable use policies, yet have regional or line of business security teams have the flexibility to make changes that reflect specific needs in

Maria Ramirez

Maria Ramirez

December 19, 2018 2:36 PM

Zero Trust Security Protects Businesses while Enabli ...

Many companies have their own applications, internal domains, and local area network (LAN). But when it comes to business applications, organizations are increasingly dependent on cloud-based resources. These may include email servers, customer relationship management (CRM) software, or other applications. However, when access to internal machines by external users is necessary, the most common solutions are centered on virtual private networks (VPNs).

Haru Kaneko

Haru Kaneko

November 29, 2018 9:26 AM

ZERO TRUST SECURITY - THREAT REPORT FOR EDUCATION

Originally Published: https://blogs.akamai.com/jp/2018/09/post-9.html Generation Z and New Challenges in the Education Field The youth of Generation Z grew up with Windows 2000 and XP, and many played with iPhones, iPads, and Android products. Known as digital natives, they are an essential part of today's educational landscape -- where cloud, mobile, and social networks form the infrastructure for their daily lives. For them, the Internet itself may seem more relevant than