Akamai Diversity

The Akamai Blog

Andrew Terranova

Andrew Terranova

October 2, 2018 4:08 PM

Zero Trust Security Architectures - Akamai's Approac ...

This is Part 5 of a 5 part blog series. Jump to Part 1: Introduction Jump to Part 2: Network Micro-Segmentation Jump to Part 3: Software Defined Perimeter Jump to Part 4: Identity Aware Proxy Introduction In the first part of this blog series, we covered an overview of zero trust architecture concepts. The main concept is that trust should never be assumed based on where a user is in

Faraz Siddiqui

Faraz Siddiqui

September 27, 2018 9:14 AM

Zero Trust Security Architectures - Identity Aware P ...

By Faraz Siddiqui and Andrew Terranova This is Part 4 of a 5 part blog series. Jump to Part 1: Introduction Jump to Part 2: Network Micro-Segmentation Jump to Part 3: Software Defined Perimeter Jump to Part 5: Akamai's Approach to Zero Trust

Jim Black

Jim Black

September 26, 2018 8:57 AM

Accelerating Your Zero Trust Security Transformation ...

The basic concepts of zero trust security are relatively simple: trust nothing, verify everything, and maintain consistent controls. But, for CISOs and CIOs charged with transforming their legacy moats and castles architecture to one that allows their enterprises to embrace all of the benefits of zero trust, this is not a simple forklift change. Many enterprises Akamai that consults on zero trust are on transformational journeys, resulting in multi-year projects

Kristen Raybould

Kristen Raybould

September 26, 2018 8:37 AM

Time to Eliminate Traditional VPNs

It is time to stop trusting your endpoints implicitly and reduce the complexity and risk associated with traditional VPN access and flat networks.

Jano van Deventer

Jano van Deventer

September 25, 2018 9:07 AM

Zero Trust Security Architectures - Software Defined ...

By Jano van Deventer and Andrew Terranova This is Part 3 of a 5 part blog series. Jump to Part 1: Introduction Jump to Part 2: Network Micro-Segmentation Jump to Part 4: Identity Aware Proxy Jump to Part 5: Akamai's Approach to Zero Trust Introduction In the first part of this blog series, we covered an overview of zero trust architecture concepts. The main concept is that trust should never

Don Ng

Don Ng

September 21, 2018 9:57 AM

Rise of Credential Stuffing in Asia Pacific and Japa ...

The rise of credential stuffing attacks globally is made possible by the tendency of customers' re-using the same credentials across different websites and attackers' easy access to stolen credential lists.

Andrew Terranova

Andrew Terranova

September 20, 2018 11:38 AM

Zero Trust Security Architectures - Network Micro-Se ...

This is Part 2 of a 5-part blog series. Jump to Part 1: Introduction Jump to Part 3: Software Defined Perimeter Jump to Part 4: Identity Aware Proxy Jump to Part 5: Akamai's Approach to Zero Trust Introduction In the previous part of this blog series, we covered an overview of Zero Trust architecture concepts. The main concept is that trust should never be assumed based on where a user

Martin McKeay

Martin McKeay

September 19, 2018 5:40 AM

State of the Internet Security - Credential Stuffing

Credential stuffing, and the botnets behind this activity, is the primary focus of the State of the Internet Security Report, Issue 4, 2018. Credential stuffing, the use of botnets to try to login to a site with stolen or randomly created login information, isn't a new phenomenon, but it is one that is having a growing impact, especially on financial services organizations. Our latest report takes a deeper look at

Andrew Terranova

Andrew Terranova

September 18, 2018 7:29 AM

Zero Trust Security Architectures

This introduction is Part 1 of a 5 part blog series. Jump to Part 2: Network Micro-Segmentation Jump to Part 3: Software Defined Perimeter Jump to Part 4: Identity Aware Proxy Jump to Part 5: Akamai's Approach to Zero Trust Introduction Most enterprises today operate hundreds of applications that support core business practices and were developed years ago with the same assumption in mind - that anyone inside the perimeter