Akamai Diversity

The Akamai Blog

Written by Mani Sundaram, SVP Global Services & Support; Francis Trentley, VP Security Services & Support; Roger Barrango, Director Global Security Operations.

Hurricane Irma affected millions this week. As always here at Akamai, taking care of people comes first, and the wellbeing of our team was the foremost priority. Akamai had both personnel and facilities in the storm path and operated with an abundance of caution to ensure the safety of our people as well as continued continuity of operations for our customers.

This Guest blog was written by Martha Gomez Vazquez, a Senior Research Analyst for IDC's Infrastructure Services research practice focusing on Security Services and Hardware & Software Support and Deployment.

The widespread success of security breaches over the past few years has proven beyond a doubt that the security threat landscape continues to evolve on a daily basis, forcing organizations to constantly rethink their security posture. At the same time, many organizations are also on a digital transformation journey, one that relies on technologies such as cloud, big data and analytics, mobile, and social. These technologies are rapidly changing the ways we connect and work; they are also changing how organizations now view network perimeters and security. By 2020, IDC predicts that digital transformation will shift to an entirely new scale and 50% of global companies will generate half of their business from digitally transformed offerings, operations, and supplier distribution and customer networks.

Written by Sr. Solutions Engineer, Micah Maryn.

Most folks around the Washington DC beltway have heard the cybersecurity Executive Order (EO 13800 - Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure) referred to as a simple risk assessment. But the reality is that it is much more about broadly modernizing federal IT infrastructure and improving the cybersecurity of our federal networks. Sure, the first step is a risk management report, but the next focuses on procurement of shared IT, including cloud and cybersecurity services.

Akamai's DNS Contribution to Internet Resiliency

Background

Akamai Technologies recently contributed its "Serve Stale" DNS algorithm to Version 9 of the Internet Systems Consortium's (ISC) Berkeley Internet Name Domain (BIND) open source Domain Name System (DNS) project.

As the Internet's most widely used DNS implementation, BIND operates ubiquitously throughout the Internet. The ongoing availability of answers from BIND servers is a critical element for the ongoing availability of the Internet for many users.

WireX update: UDP attack capabilities

*Akamai would like to acknowledge the research by F5 containing additional information on the capabilities of this malware, released September 2nd.

Finding new features

The WireX botnet was discovered due to its role in a series of prolonged attacks against several organizations. It was brought to our attention, thanks to researchers at 360.cn, that some WireX samples found in the wild appeared to have additional UDP attack capabilities that weren't discussed in the initial publication.

Infographic: How Botnets Work

With IoT on the rise, consumers are rightfully afraid of privacy invasions. But, infected devices can serve far more sinister purposes. Herewith, we breakdown the ways a botnet works.

Girls Who Code: That's a Wrap!

The Summer Immersion Program for Girls Who Code at Akamai wrapped up this past week. The girls finished their final projects and presented them at a graduation ceremony attended by friends and family as well as supporters and mentors from Akamai.

Game Crunch Doesn't Always Have to be a Thing

You've been dreading the conversation. You know there's no way out of it, given the timeline. Your execs have made it clear that the very large marketing spend is going to hit during the week when two of your engineers were planning to be on vacation.

You've got a brilliant team that has helped you stand up games and keep them working even when the fan excitement threatened to overwhelm your servers. This time, you know the plan is for a global launch, and in the back of your mind you're worried you've underbuilt. There's good reason for this - infrastructure isn't free, and there's no way you'd get the budget to build out to the best case scenario all over the world. This situation is one you've tried to plan for, until the marketing dates moved.

Introduction

On August 17th, 2017, multiple Content Delivery Networks (CDNs) and content providers were subject to significant attacks from a botnet dubbed WireX. The botnet is named for an anagram for one of the delimiter strings in its command and control protocol. The WireX botnet comprises primarily Android devices running malicious applications and is designed to create DDoS traffic. The botnet is sometimes associated with ransom notes to targets.

A few days ago, Google was alerted that this malware was available on its Play Store. Shortly following the notification, Google removed hundreds of affected applications and started the process to remove the applications from all devices.

Take a Bite out of Cybercrime by Analyzing New Core Domains

We just conducted our monthly Cyber Insider discussion, this time focusing on what deep analysis of new core domains reveals about new threats and zero-day malware. As a company that processes 1.7 trillion DNS queries a day and analyzes 100 billion queries a day from our global service provider customers, we are in a unique position to gain insights.