Get In Touch
There are two types of companies: Those who have been hacked, and those who don't yet know they have been hacked1 With data breaches frequently making the news and causing panic among network administrators, the above statement by former Cisco boss John Chambers in 2015 certainly doesn't seem far-fetched. I don't remember a week in 2018 going by where I wasn't learning of a data breach and how sophisticated the
Is it too late to still say "Happy New Year?" We don't think so. We're kicking off 2019 with our first issue of the State of the Internet / Security.
Application Servers are implemented as a means of providing services and making resources available to users. However, any server connected to the Internet is inevitably targeted by malicious users using open listening ports. There are millions of these ports on the Internet, which means there is plenty of opportunity to exploit these open services.
As mentioned in the 2018 Year in Review State of the Internet / Security report, trends in DDoS are remarkably stable. The size of the largest attacks have grown by approximately 6% on an annual basis, with occasional outliers like the Mirai botnet. The median size of attacks has been much more changeable, with a cyclic growth and retreat on a two year basis. Unluckily, the ebb of DDoS is
Authentication might be the single biggest hazard for web security over the next decade. It's not that the fundamentals of authentication are particularly challenging; we've understood the basic principles behind password management, push-based authorization, and device certificates for some time. But managing those at scale, and navigating to a more secure world -- maybe one without passwords someday -- requires a level of investment and focus that is, for most
If you asked anyone 10 years ago who the winner would be in the over online video formats, you would have heard some strong opinions -- and some incorrect predictions. Video standards and formats will continue to change as long as users demand new ways to view content. AkamaiTV's Nelson Rodriguez recently met with Encoding.com President Jeff Malkin to discuss who can possibly win in the war for a common
Part 2 - Security In the first post, web performance was discussed, especially for the mobile visitor. While web performance is critically important, security is also a vital area of focus and investment because, threat actors don't take holidays. They're always out on the internet probing sites, looking for vulnerabilities and ways to steal data or take over sites. They are however, keenly aware of holidays and what that
Predicting and preparing for peak traffic volume and resource demands is a difficult task for online retailers around the world. They need to be ready for both expected and unexpected traffic spikes at any time. No one wants the CEO on their doorstep asking why their website is down and losing revenue every second it remains offline. In this post, the first of two parts, I'll share key web
Over the last two years, we've seen a surge in OTT offerings as viewers insist on watching what they want, when they want, on any device, anywhere. Major content creators like Netflix and Amazon have made significant strides to push this technology into the mainstream, however true mass adoption will happen when traditional broadcast companies adopt OTT in a significant way. AkamaiTV's Ian Munford recently sat down with Mark Harrison