Akamai Diversity

The Akamai Blog

Gerhard Giese

Gerhard Giese

June 10, 2020 2:34 PM

Mitigating Credential Stuffing Attacks in the Financ ...

(If You Think Multi-Factor Authentication Prevents Credential Stuffing, Think Again!) Financial services firms around the world are experiencing credential stuffing attacks at an alarming rate. Cybercriminals are using readily available automation tools, botnets, and compromised account credentials to mount increasingly sophisticated and stealthy attacks. Many businesses are using multi-factor authentication (MFA) to strengthen access security and combat credential theft. While useful and necessary, MFA does not necessarily prevent credential stuffing.

Tom Emmons

Tom Emmons

May 26, 2020 3:02 PM

Record 0-Second SLA PPS Mitigation

Record-High 312 Mpps Attack Mitigated in 0 Seconds On May 2, 2020, Akamai blocked a large PPS-focused attack against one of our financial services customers in 0 seconds, utilizing a proactive mitigation posture. This was one of the largest PPS levels we have on record, and the biggest mitigated to date in 0 seconds. The attacker launched a bevy of minimally sized UDP packets in an attempt to overwhelm network

Richard Meeus

Richard Meeus

April 27, 2020 3:40 PM

PSD2 and Open Banking -- The New Way to Work Your Mo ...

The main question behind the Payment Services Directive (PSD2) and Open Banking: Is it innovative or just platitudes against competition?

Roopesh Balakrishna

Roopesh Balakrishna

November 27, 2018 12:31 PM

India's Startup Story - The Future of India's Digita ...

India's goal of reaching a $1 trillion digital economy by 2022[1] is said to be fuelled, in part, by the spurt in the growth of startups across the country. The number of Internet users in India is growing at an enormous rate with close to 500 million internet users today[2]. Indians are at the forefront of driving the global digital revolution. The growth of startups in India makes the country

Rich Bolstridge

Rich Bolstridge

December 12, 2016 10:51 AM

Dyn DDoS Attack: Lessons Learned for the Financial S ...

In the first of this two-part blog, I reported the impact that the Dyn DDoS attack had on the financial services industry. Banks, insurers, credit cards, and others had two waves of impacts on Oct. 21, with many websites clocking in with 60 second page response times, and others with outright failures, not able to service their customers. In Part 2, we'll dig into some details to better understand the

Rich Bolstridge

Rich Bolstridge

October 31, 2016 9:34 AM

Dyn DDoS Attack: Wide-Spread Impact Across the Finan ...

The recent DDoS attack against the Dyn DNS service resulted in major impact across the financial services industry, and provides us an example to better understand the technology risks and the lessons learned from this attack. In the first of this two part blog, we will examine the impact that the attack had on banks, insurance companies, and other firms in the industry. In Part 2, we'll dig into some

Rich Bolstridge

Rich Bolstridge

September 12, 2016 9:37 AM

The Easiest way to Improve the User Experience

I had an interesting conversation with a former Akamai banking customer this week about his past experience with Akamai. He is now an independent consultant, working with banks on digital transformation and other projects.

Akamai

Akamai

July 27, 2016 10:23 AM

American Banker's CyberSec 2016 Conference - That's ...

Last week, American Banker hosted its brand new conference, Cybersec 2016 in Midtown Manhattan. Penny Crosman (@pennycrosman), Editor at Large, American Banker, did a great job as chair of the event and brought together thoughtful presenters and panelists. There were great insights from leaders in the industry from BBVA, Bank of the West, USAA, Mastercard, U.S. Bank, and many others. It was a fantastic day of information sharing - exactly

Rich Bolstridge

Rich Bolstridge

May 27, 2016 12:12 PM

The Case for Increased Security Investment in a Guar ...

The financial services sector is arguably the most advanced private sector for intelligence gathering, security information sharing, and investment in cyber security controls. For those of us who have been involved in cyber security for the last few years, we have the experienced periods of high threat activity, such as the al-Qassam Cyber Fighters and Operation Ababil, as well as periods of relative calm.