Akamai Diversity
Home > Carrier & Network

Recently in Carrier & Network Category

Zero Trust and the Slowly Boiled Frog

Disclaimer: No actual frogs were harmed in the writing of the blog post. We wouldn't do that. We like frogs.

What is Zero Trust Networking?

The Zero Trust security model was proposed by John Kindervag of Forrester Research back in 2010. The concept is that the traditional trust model of "trust, but verify" is no longer valid; instead we should "never trust, always verify".

Survey Says: So Long Grey Skies - Telecoms 2018 Outlook

Nominum, a part of Akamai, recently partnered with Telecoms.com to survey over 1,500 telecom professionals to get a sense of their concerns, initiatives and expectations for 2018. The findings are captured in the report Telecoms.com Annual Industry Survey 2017.

How do I know if I'm Secure?

JKK BLOG.pngRemember those commercials for excessive cell phone roaming coverage?  The ones with clever skits highlighting the end user having no idea that their phone had crossed an invisible border and switched from primary to roaming coverage?  Immediately incurring increased costs for calling, texting and data usage that only become visible when you receive your monthly bill? 

Will Subscribers Pay for Security?

Carriers see security as a vital component of their five-year strategies and expect to increase spending on security in 2018 according to the Telecoms.com Annual Industry Survey 2017.  Is security a good business opportunity for Carriers?

Secure by Design

Carriers providing value-added services need to protect both their network infrastructure and their end-customers from internet threats. New threats are constantly emerging but remodeling your security architecture to address each new threat may leave gaps in your security coverage.  Bolting-on third party products to fill gaps isolates your core architecture from change but creates complexity and management challenges such as multiple operating consoles and data integration barriers.  Are carriers fighting a losing battle?

A Death Match of Domain Generation Algorithms

By Hongliang Liu and Yuriy Yuzifovich

Originally posted on December 29, 2017 

Today's post is all about DGA's (Domain Generation Algorithms): what they are, why they came into existence, what are some use cases where they are used, and, most importantly - how to detect and block them. As we will demonstrate here, the most effective defense against DGAs is a combination of traditional methods with modern machine intelligence.

Unlocking Locky

Locky is a new cyberthreat that has received a lot of attention in security circles over the last few months because it has been unusually successful. Locky is advanced ransomware that encrypts a person's files and holds them for ransom. It uses a number of different technologies to avoid being detected or blocked and takes great care to hide its path back to the attackers. The code is obfuscated to avoid detection by antivirus and malware software. The blackmailers communicate through TOR and only accept Bitcoin as payment, making it nearly impossible to discover who they are.

Bringing OTT Video to Life at NAB

We are less than a month away from NAB and Akamai has some big plans in store. With the amount of buzz centered around over-the-top (OTT) video, our floor presence is dedicated to bringing OTT workflow and delivery to life. Show attendees can experience a behind-the-scenes look at the technologies that are helping drive the seismic transformation in media delivery and consumption. Each section of the Akamai booth will represent a key component of OTT workflow including capture, cloud, monitor and consume.

Refining the State of the Internet Report


Over the last several years, many users have adopted mobile devices, including smartphones and tablets, as their primary means of accessing the Internet. A number of studies published over the past year illustrate this trend, especially among millennials. In addition, improvements to, and greater deployment of this technology by mobile network providers have led to mobile connection speeds that rival fixed broadband connections in some geographies.  LTE-Advanced, which is being rolled out by carriers in countries around the world, provides for download speeds in the hundreds of Mbps range, with the latest Android and Apple devices including support for LTE-Advanced.

Akamai Assists ISPs in Providing a Family-Friendly Internet

 

Family and Internet safety advocates have lobbied long and hard to government regulators and Internet service and content providers for stronger measures and controls over the types of content viewable by children when online. And based on recent reports, some ISPs have responded in a favorable way, by implementing services that place automatic blocks on "high risk" websites including those that feature nudity or sexual content or are related to drugs, alcohol or tobacco, among others. Furthermore, users seem to be taking advantage of these services rather than opting out of them, creating safer Internet environments in their homes, while Internet providers reap the benefits of high scores for customer satisfaction and the potential for long-term revenue growth. A true win-win!

<< 1 2 3