
The Akamai Blog Subscribe
Residential Internet Connections are now Business Co ...
Near-global mandates to stay at home have completely reshaped the internet security landscape. Remote work is the new normal, inverting the traditional office model. Attackers are not relenting as they see opportunity to take advantage of a world with a singular focus.
COVID-19 Phishing: Exploiting a Global Pandemic
It's sad to think criminals are hard at work taking advantage of the extraordinary stress the world's population is currently experiencing. But they are. New phishing scams exploiting anxiety about COVID-19 are trending upward. Akamai's Carrier Data Science and Threat Research teams analyzing real-time worldwide DNS resolution data have listed as many as 9,000 COVID-19 related phishing urls daily over the last few weeks.
At 21 Tbps, reaching new levels of IPv6 traffic!
While setting a new record of 140 Tbps of peak traffic delivered on February 11th, Akamai reached another new milestone in the process: 21 Tbps of peak IPv6 traffic delivered! The global adoption of IPv6 is important to the future of the Internet and Akamai has been committed to helping move IPv6 deployment forward ever since we launched production IPv6 support in 2012.
Phishing Trends Position ISPs to Protect Subscribers
Akamai just released the 2019 State of the Internet (SOTI) security report: Phishing - Baiting the Hook featuring findings from the enterprise and carrier research teams. They've been collaborating for two years to develop better methods for evaluating massive volumes of anonymized, live-streamed DNS query data to uncover more phishing, bots and other threats.
Architectural paths for evolving the DNS
The Domain Name System (DNS) is one of the Internet's fundamental systems, providing the top-level hierarchy for naming Internet resources. One of its purposes is to act as a sort of phonebook, allowing names such as "www.example.com" to be resolved to resource information, such as server IP addresses. It provides the hierarchical naming model that enables clients to "resolve" or "lookup" resource records associated with names. This naming hierarchy also
Zero Trust and the Slowly Boiled Frog
Disclaimer: No actual frogs were harmed in the writing of the blog post. We wouldn't do that. We like frogs. What is Zero Trust Networking? The Zero Trust security model was proposed by John Kindervag of Forrester Research back in 2010. The concept is that the traditional trust model of "trust, but verify" is no longer valid; instead we should "never trust, always verify".
Survey Says: So Long Grey Skies - Telecoms 2018 Outl ...
Nominum, a part of Akamai, recently partnered with Telecoms.com to survey over 1,500 telecom professionals to get a sense of their concerns, initiatives and expectations for 2018. The findings are captured in the report Telecoms.com Annual Industry Survey 2017.
How do I know if I'm Secure?
Remember those commercials for excessive cell phone roaming coverage? The ones with clever skits highlighting the end user having no idea that their phone had crossed an invisible border and switched from primary to roaming coverage? Immediately incurring increased costs for calling, texting and data usage that only become visible when you receive your monthly bill?
Will Subscribers Pay for Security?
Carriers see security as a vital component of their five-year strategies and expect to increase spending on security in 2018 according to the Telecoms.com Annual Industry Survey 2017. Is security a good business opportunity for Carriers?