Get In Touch
Seeing opportunities as residential internet services have been transformed into business internet services, ISPs and Mobile Network Operators (MNOs) are making moves to use the power of their networks to protect customers. As they progress through the decision and deployment cycles, we often get questions about Best Practices for service delivery. This blog post summarizes the insights we've gained working with dozens of customers around the world.
Near-global mandates to stay at home have completely reshaped the internet security landscape. Remote work is the new normal, inverting the traditional office model. Attackers are not relenting as they see opportunity to take advantage of a world with a singular focus.
It's sad to think criminals are hard at work taking advantage of the extraordinary stress the world's population is currently experiencing. But they are. New phishing scams exploiting anxiety about COVID-19 are trending upward. Akamai's Carrier Data Science and Threat Research teams analyzing real-time worldwide DNS resolution data have listed as many as 9,000 COVID-19 related phishing urls daily over the last few weeks.
While setting a new record of 140 Tbps of peak traffic delivered on February 11th, Akamai reached another new milestone in the process: 21 Tbps of peak IPv6 traffic delivered! The global adoption of IPv6 is important to the future of the Internet and Akamai has been committed to helping move IPv6 deployment forward ever since we launched production IPv6 support in 2012.
Akamai just released the 2019 State of the Internet (SOTI) security report: Phishing - Baiting the Hook featuring findings from the enterprise and carrier research teams. They've been collaborating for two years to develop better methods for evaluating massive volumes of anonymized, live-streamed DNS query data to uncover more phishing, bots and other threats.
The Domain Name System (DNS) is one of the Internet's fundamental systems, providing the top-level hierarchy for naming Internet resources. One of its purposes is to act as a sort of phonebook, allowing names such as "www.example.com" to be resolved to resource information, such as server IP addresses. It provides the hierarchical naming model that enables clients to "resolve" or "lookup" resource records associated with names. This naming hierarchy also
Disclaimer: No actual frogs were harmed in the writing of the blog post. We wouldn't do that. We like frogs. What is Zero Trust Networking? The Zero Trust security model was proposed by John Kindervag of Forrester Research back in 2010. The concept is that the traditional trust model of "trust, but verify" is no longer valid; instead we should "never trust, always verify".
Nominum, a part of Akamai, recently partnered with Telecoms.com to survey over 1,500 telecom professionals to get a sense of their concerns, initiatives and expectations for 2018. The findings are captured in the report Telecoms.com Annual Industry Survey 2017.
Remember those commercials for excessive cell phone roaming coverage? The ones with clever skits highlighting the end user having no idea that their phone had crossed an invisible border and switched from primary to roaming coverage? Immediately incurring increased costs for calling, texting and data usage that only become visible when you receive your monthly bill?