Akamai Diversity

The Akamai Blog

Haru Kaneko

Haru Kaneko

November 29, 2018 9:26 AM

ZERO TRUST SECURITY - THREAT REPORT FOR EDUCATION

Originally Published: https://blogs.akamai.com/jp/2018/09/post-9.html Generation Z and New Challenges in the Education Field The youth of Generation Z grew up with Windows 2000 and XP, and many played with iPhones, iPads, and Android products. Known as digital natives, they are an essential part of today's educational landscape -- where cloud, mobile, and social networks form the infrastructure for their daily lives. For them, the Internet itself may seem more relevant than

Jim Black

Jim Black

November 16, 2018 1:24 PM

U.S. Mid-term Elections and Akamai Enterprise Threat ...

The last few years have witnessed seismic changes in the world's political landscape and the way elections have been conducted. As of yet, there's no conclusive evidence that the results and outcomes of a country's election process have been impacted by the cyber efforts of internal or foreign agencies. However, all of the speculation and discussion around this subject has heightened the awareness of governments around the world that they

Dan Kirwan-Taylor CISSP

Dan Kirwan-Taylor CISSP

October 23, 2018 10:43 AM

Why traditional security isn't enough

We are constantly being bombarded with questions around the security of our data, but what about security for the devices needed to connect to that data? The world is a changing place and for those inclined to be unsavoury characters, a great place to anonymously make ill-gotten gains from unsuspecting victims who thought they were doing due diligence with their base-model anti-malware and anti-virus programs. After multiple data breaches, we

Ashish Singh

Ashish Singh

October 16, 2018 10:32 AM

Managing Thousands of users in Hundreds of branches ...

We live in a global business world. Almost on a daily basis, we see organizations expanding rapidly across geographies. While businesses in every industry can have international sites, some verticals like banking, finance, education, and retail are more apt to have corporate offices in multiple locales. Companies are typically in Tier 1/metropolitan cities with over 1,000 users, medium branches are in Tier 2 cities with 500-1000 users, Tiers 3 and

Jim Black

Jim Black

September 26, 2018 8:57 AM

Accelerating Your Zero Trust Security Transformation ...

The basic concepts of zero trust security are relatively simple: trust nothing, verify everything, and maintain consistent controls. But, for CISOs and CIOs charged with transforming their legacy moats and castles architecture to one that allows their enterprises to embrace all of the benefits of zero trust, this is not a simple forklift change. Many enterprises Akamai that consults on zero trust are on transformational journeys, resulting in multi-year projects

Randy D'Souza

Randy D'Souza

September 14, 2018 2:01 PM

DNS is a Unique (and Necessary) Security Control

Like many other security professionals, you have been reviewing your security stack, reading up on the latest security trends, and have perhaps recently attended Info-Sec, RSA, Black Hat or some other relevant conference. Along the way, you may have seen messaging for recursive DNS (rDNS) as a security layer. However, it's hard for you to believe DNS is an effective security control, as you know it is a lookup service

John Neystadt

John Neystadt

September 6, 2018 9:49 AM

Getting the most out of your branch local connection

In our global world of business, organizations often have multiple branch offices spanning every country. Some of these branches are quite large with their own IT infrastructure and personnel, while some are very small with just a few employees. In the past, these branch offices were connected to the main office using MPLS or other connectivity in a hub-and-spoke topology. Today, however, many enterprises are adding local Internet break-outs to

John Neystadt

John Neystadt

August 20, 2018 2:47 PM

Dispelling the Myths Surrounding Security Technology ...

Many of our customers conducting business in Europe are concerned about how the new General Data Protection Regulation ("GDPR") impacts the ability to protect their organization's data, network and IT system resources. In particular, many worry that the requirements of GDPR will restrict their abilities to decrypt, analyze or log networking traffic for security purposes. However, enterprises needn't worry, as GDPR actually does permit these types of security controls.

Andrew Crail

Andrew Crail

June 21, 2018 12:39 PM

Mergers, Acquisitions, and Malware?

Every year, tens of thousands of mergers and acquisitions (M&A) take place across every industry and vertical. In fact, "In 2017, companies announced over 50,600 transactions with a total value of more than 3.5 trillion USD."[1] Not only is M&A complex from a business sense, it also brings the challenge of merging complex IT infrastructures and applications (which are only getting more complex) as businesses move away from a perimeter