Akamai Diversity

The Akamai Blog

Charlie Gero

Charlie Gero

March 1, 2016 1:33 PM

Enterprise Security - SSL/TLS Primer Part 1 - Data E ...

Join me over the next few posts as I talk about how to provide fast, reliable, and secure applications in the branch while protecting end-users and promoting a transparent and open Internet. Let's start with the basics. So what is SSL/TLS & how does it work?

Bill Brenner

Bill Brenner

March 1, 2016 8:35 AM

Q4 2015 State of the Internet Security Report: Five ...

Yesterday, Akamai released the Q4 2015 State of the Internet Security (SOTI Security) Report (download here). I'll write posts throughout the week focusing on specific parts of the report. For this installment, let's take a look at mega-DDoS attacks from last quarter. Related: Q4 2015 SOTI Security presentations at RSA Conference 2016 Q4 2015 SOTI Security Infographic Video: SOTI Security in 60 Seconds with Akamai CSO Andy Ellis In

Renny Shen

Renny Shen

February 29, 2016 1:40 PM

Got Bots? Get Answers from Akamai at RSA Conference ...

If you're headed to the RSA Conference 2016, be sure to stop by the Akamai booth #4000, in Moscone North Hall. We're very excited about the recent launch of our Bot Manager web security technology and we'll show you firsthand how it works in a live demo. You'll see how Bot Manager provides, for the first time, the capability to categorize bot types and manage bot activity on your website.

Akamai SIRT Alerts

Akamai SIRT Alerts

February 29, 2016 12:06 PM

Akamai's State of the Internet Security Report with ...

The State of the Internet Security report by Akamai is issued four times a year with information on the types of online attacks that Akamai Technologies protects its customers from every day. In this free report, you can read about changes in Distributed Denial of Service (DDoS) attacks with multiple different metrics. In addition, we look at the various types of web attacks against our customers and a spotlight on

Bill Brenner

Bill Brenner

February 29, 2016 8:25 AM

Q4 2015 State of the Internet Security Report: An In ...

Today Akamai released the Q4 2015 State of the Internet Security (SOTI Security) Report (download here). I'll write posts throughout the week focusing on specific parts of the report, but let's begin with an overview in the form of an infographic. Related: Q4 2015 SOTI Security presentations at RSA Conference 2016

Bill Brenner

Bill Brenner

February 29, 2016 8:05 AM

#RSAC 2016 State of Internet Security Presentations

Today, as RSA Conference 2016 opens, Akamai is releasing its Q4 2015 State of the Internet Security Report. At the Akamai Booth in Moscone Center's North Exhibit Hall, I'll give overviews of the report and we'll hand out printed copies. If you want to check out a presntation, here's the schedule: Tuesday - 10 -6, noon and 3 p.m. PT Wednesday - 10-6, noon and 4 p.m. PT Thursday -

Akamai SIRT Alerts

Akamai SIRT Alerts

February 25, 2016 1:00 PM

IKE/IKEv2 Ripe for DDoS Abuse

By Bill Brenner, Akamai SIRT senior tech writer Akamai's Security Intelligence Research Team (SIRT) is conducting research into the security posture of the Internet Key Exchange (IKE & IKEv2) protocol. The paper outlines the findings thus far, including configurations in the protocol itself that attackers could potentially leverage to launch reflected DDoS campaigns.

Akamai

Akamai

February 23, 2016 6:14 AM

Akamai and the Glibc Vulnerability (CVE-2015-7547)

Akamai continues to investigate the Glibc vulnerability outlined in CVE-2015-7547 to see how its technology may be affected. As part of the DNS query process, Glibc is used by many systems across the Internet -- and at Akamai -- and all versions of Glibc's getaddrinfo () library functions since version 2.9 are potentially vulnerable to a range of attacks based on a stack buffer overflow.

Akamai

Akamai

February 22, 2016 10:27 AM

Ransomware cyberattacks in healthcare? Sadly, yes.

It's been widely reported that Hollywood Presbyterian Medical Center experienced a ransomware attack on February 5 that encrypted their data and disabled their network. The hospital was forced to revert to paper and faxes to relay patient information, and hospital operations were so strained that they succumbed to the cyberattack and paid the hackers 40 bitcoins, or about $17,000, to get the decryption key.