Get In Touch
Sports, gaming, and other live events have the potential to overwhelm network capacity due to the sheer volume of traffic generated when large numbers of viewers or gamers engage. These "peak" events may only occur once a month or even once a year (sports championships, election results, gaming downloads, etc.) with far lower, more consistent, and predictable traffic levels the rest of the time.
It seems like a long time ago now when IT teams had their annual strategy meeting, where topics related to network modernization with SASE or SD-WANs, remote access, threat prevention, and cloud adoption were likely discussed. COVID-19, however, has caused a lot of these initiatives to take a backseat and put the spotlight on business continuity.
Like many people around the world, my hair has grown profusely in the past few months and bears little resemblance to the photo in my profile. Without the required care and attention, my hair is getting dangerously close to the bad hairstyles I adopted in the 1980s.
On June 21, 2020, Akamai mitigated the largest packet per second (PPS) distributed denial-of-service (DDoS) attack ever recorded on the Akamai platform. The attack generated 809 million packets per second (Mpps), targeting a large European bank.
It always surprises me how easily a community can adapt to a new situation or reality. What was once considered an outlier or even an unimaginable situation can quickly become our new normal.
Infrastructure as Code (IaC) and Continuous Delivery methods have become increasingly popular amongst development and operations teams as a means of maintaining high-performing websites. Code repositories, build servers, and configuration management systems are now industry standards, as these tools replace cumbersome manual touchpoints with transparent automated workflows. Consequently, DevOps CI/CD tools are an effective means of delivering a more reliable end product to customers.
Seeing opportunities as residential internet services have been transformed into business internet services, ISPs and Mobile Network Operators (MNOs) are making moves to use the power of their networks to protect customers. As they progress through the decision and deployment cycles, we often get questions about Best Practices for service delivery. This blog post summarizes the insights we've gained working with dozens of customers around the world.
(If You Think Multi-Factor Authentication Prevents Credential Stuffing, Think Again!) Financial services firms around the world are experiencing credential stuffing attacks at an alarming rate. Cybercriminals are using readily available automation tools, botnets, and compromised account credentials to mount increasingly sophisticated and stealthy attacks. Many businesses are using multi-factor authentication (MFA) to strengthen access security and combat credential theft. While useful and necessary, MFA does not necessarily prevent credential stuffing.
If you want to see an argument break out among identity professionals, mention single sign-on (SSO) and consumer session management. As fast as this technology's evolved is as fast as it's become one of the most contentiously debated topics in the field.