Akamai Diversity

The Akamai Blog

In the first of this two-part blog, I reported the impact that the Dyn DDoS attack had on the financial services industry.  Banks, insurers, credit cards, and others had two waves of impacts on Oct. 21, with many websites clocking in with 60 second page response times, and others with outright failures, not able to service their customers.

In Part 2, we'll dig into some details to better understand the technology risks of financial services websites, and extract some lessons learned for the industry.

Nominum, now part of Akamai, inaugural security report published by its Data Science team, Data Revelations: Fall 2016, includes an analysis of some of the largest threats that are impacting organizations and individuals, including ransomware, DDoS, mobile malware, IoT-based attacks and more. Since DNS is the launch point for over 90% of cyberattacks, it offers a great vantage point from which to examine, understand, thwart and proactively prevent threats1. With industry-leading research experience, and by applying machine learning, artificial intelligence, natural language processing, neural networks and more, Nominum Data Science is able to locate, analyze, prevent and predict some of the most sophisticated and dangerous cyberthreats ever to hit the internet.

The increasingly digital consumer lifestyle, fueled by explosive growth in the use of the internet, mobile technologies and social media, has given rise to the empowered customer. With access to more information, choices, and opportunities, consumers across all industries are in a position to demand not only what they want, but also where and how they want it.

Do you want to build a server empire?

Have you ever visited a soybean farm in North Carolina? I haven't, despite the fact that it's one of the top 5 crops for the state. I have, though, visited one of the lesser known profit driving farms in NC, the server farm. To be more accurate, I visited the front end showroom for a major server manufacturer and service provider. It was a fully functioning cold server room, with a raised floor, and giant cables criss-crossing the ceiling. It reminded me of the scene in the Matrix when Morpheus leads Neo into the giant weapons cache.

Automating your Image Workflow with Akamai Image Manager

Images are used to inspire, evoke emotion, and provide ways of communicating that simply cannot be done with words. It's no wonder that web pages with images get 94 percent more views than those without.

Images have become integral to how we experience the web, and the importance of delivering the right image at the right time to your users couldn't be more important. First impressions matter, and your users will see and experience images on a web page 60,000 times faster than text.

At SOASTA, we collect a massive amount of real user data for many top retailers. This past long weekend, not surprisingly, saw an enormous surge in the amount of user experiences our customers monitored and measured. On Black Friday alone, we collected almost 2 billion beacons' worth of real user data.* By the end of Cyber Monday, we estimate that we will have collected between 5-7 billions beacons of data.

With the Black Friday, Cyber Monday holiday weekend upon us, retailers in the U.S. and abroad are preparing for another peak period for customer acquisition and commerce revenues.  In 2016, the U.S. eCommerce market is the second largest globally and is expected to reach a total of $482 billion by 2018.  China is still the global leader with its B2C eCommerce market accounting for 38% of worldwide turnover; this Singles' Day, November 11th, 2016, Alibaba's success highlighted the region's potential turning over $17.8 billion in sales in one day (and $1 billion in just the first five minutes), surpassing last year's record of $14.3 billion record by 24%.

Prepare for the Worst, Hope for the Best

Leading up to the U.S Presidential Election last week, the oracles of the security world were warning of all the possible types of attacks we might see during the day of decision making.  We were preparing for attacks against voting machines, disinformation spread through social media platforms, more email leaks, and above all Distributed Denial of Service (DDoS) attacks against everyone from the White House to news sites around the globe.  Yet none of these seem to have materialized.

Threats don't like being ignored

I outran a ferocious dog once. The memory is still very fresh for me, despite the fact that it happened 30 years ago. What should be most impressive about this story is that I ran up fourteen flights of stairs, without stopping. I don't think I've ever accomplished this level of physical excellence ever again. I wonder what would have happened if I had been exposed to Gamma rays just as the chase began. We'll never know.

Why is your tech so lazy?

We live in a multitasking world. You see people every day surfing their phones with their right hand, mid-conversation with the person across the table from them, while also trying to make a lunch selection from the menu in their left hand. Without getting into the concerns about our mental health and the fraying of the social fabric in our personal lives, we should recognize that we are expecting more from every interaction, and from every role in our business lives.