Get In Touch
Disclaimer: No actual frogs were harmed in the writing of the blog post. We wouldn't do that. We like frogs. What is Zero Trust Networking? The Zero Trust security model was proposed by John Kindervag of Forrester Research back in 2010. The concept is that the traditional trust model of "trust, but verify" is no longer valid; instead we should "never trust, always verify".
Nominum, a part of Akamai, recently partnered with Telecoms.com to survey over 1,500 telecom professionals to get a sense of their concerns, initiatives and expectations for 2018. The findings are captured in the report Telecoms.com Annual Industry Survey 2017.
Remember those commercials for excessive cell phone roaming coverage? The ones with clever skits highlighting the end user having no idea that their phone had crossed an invisible border and switched from primary to roaming coverage? Immediately incurring increased costs for calling, texting and data usage that only become visible when you receive your monthly bill?
Carriers see security as a vital component of their five-year strategies and expect to increase spending on security in 2018 according to the Telecoms.com Annual Industry Survey 2017. Is security a good business opportunity for Carriers?
Carriers providing value-added services need to protect both their network infrastructure and their end-customers from internet threats. New threats are constantly emerging but remodeling your security architecture to address each new threat may leave gaps in your security coverage. Bolting-on third party products to fill gaps isolates your core architecture from change but creates complexity and management challenges such as multiple operating consoles and data integration barriers. Are carriers fighting
By Hongliang Liu and Yuriy Yuzifovich Originally posted on December 29, 2017 Today's post is all about DGA's (Domain Generation Algorithms): what they are, why they came into existence, what are some use cases where they are used, and, most importantly - how to detect and block them. As we will demonstrate here, the most effective defense against DGAs is a combination of traditional methods with modern machine intelligence.
No matter what else she does in her day, Judy Piper is, first and foremost, a people manager. Her role as a senior engineering manager in the Enterprise business unit is all about empowering others, and her curiosity and fearlessness help her succeed. Judy recently answered a few questions about her cool new project, her advice to others and her favorite extreme sport.
Locky is a new cyberthreat that has received a lot of attention in security circles over the last few months because it has been unusually successful. Locky is advanced ransomware that encrypts a person's files and holds them for ransom. It uses a number of different technologies to avoid being detected or blocked and takes great care to hide its path back to the attackers. The code is obfuscated to
We are less than a month away from NAB and Akamai has some big plans in store. With the amount of buzz centered around over-the-top (OTT) video, our floor presence is dedicated to bringing OTT workflow and delivery to life. Show attendees can experience a behind-the-scenes look at the technologies that are helping drive the seismic transformation in media delivery and consumption. Each section of the Akamai booth will represent