Get In Touch
We've recently seen big attacks play out on prominent technology companies despite their use of smartphone-based multi-factor authentication. These attacks are real, they do happen, and it appears that even the smartphone cannot protect us anymore.
The dictionary defines feedback as "The modification or control of a process or system by its results or effects, for example in a biochemical pathway or behavioral response."
This is the second in a series of blog posts that discuss how smart DNS resolvers can enhance ongoing network transformation efforts such as the transition to 5G, better integration of Wi-Fi, and new network designs that optimize the edge to improve the subscriber experience, service delivery, and network efficiency.
As we close out 2020, it should come as no surprise that Cyberweek (the week of Thanksgiving through Cyber Monday) proved big for DDoS attacks. Threat actors were out in force during this key shopping season, and they shifted their sights toward disrupting digital commerce-related industries.
Agility has proven to be a key weapon in the publisher arsenal during the pandemic. Agile firms -- particularly news publishers -- that switched directions or added digital services quickly reaped the rewards of new readers and viewers, even if the audience boost didn't result in a similar increase in revenues for ad-based services in the short term.
Authentication attacks are big business, and no one is immune from them. In fact, two men were recently arrested and charged in the Twitter employee account compromise that happened in July 2020. Using employee account credentials, the attackers took over several highly visible celebrity Twitter accounts, which were then used for bitcoin scams. Think: "If you give me one bitcoin, I'll give you two!" Sounds legit, right?
I am CIAM not IAM Imagine shopping in your favourite wine merchant or checking in to the brand of hotel that you afford the most loyalty, and at the point of self-identification (either to prove age or verification) security is called over and you are frisked. Not a great experience. Would you patronise the establishment again?
In part 1 of this series, I drew the architectural distinction between a centralized cloud platform and a distributed edge network. This is an important foundation upon which to explain the difference between cloud computing and edge computing. The two serve very different and complementary purposes. However, in my experience, business leaders, product owners, and application developers often mistake them as competitive.
This is Part 2 of a 3-part blog series highlighting some of the distinguishing aspects of Akamai's DNS services, Edge DNS and Global Traffic Management. Part 1 focused on Akamai's DNS platform and what sets it apart. In Part 2, we take a closer look at the economics of DNS pricing models and why Akamai's approach is unique.