Akamai Diversity

The Akamai Blog

Viktoriya Reyzelman

Viktoriya Reyzelman

January 21, 2016 11:11 AM

Applications for the Request Control Cloudlet

Your web application by default is accessible to the entire planet. This exposure can open your site up to unnecessary risk. Akamai's Request Control Cloudlet can quickly allow or deny access to website content based on the IP or Geography associated with an inbound request. For example, you may deny access to users in embargoed countries or allow it only to a specific region where your users live. Manage the

Akamai

Akamai

January 14, 2016 10:32 AM

DDoS Attacks: Not Just a Gaming and Retail Problem A ...

Health IT Security recently published the results of Akamai's latest State of the Internet report, emphasizing that "Distributed denial of services (DDoS) attacks are up during the third quarter of 2015, reinforcing the healthcare industry's growing concern for healthcare data security." They have hit on a very salient point here, because while many may think that healthcare providers are not likely targets of DDoS attacks, there are definite reasons why

Akamai

Akamai

January 12, 2016 8:26 AM

Akamai Customers are not vulnerable to SLOTH

By Rich Salz Akamai was informed of a new TLS vulnerability -- SLOTH -- by researcher Karthik Bharghaven. Akamai then worked with the researcher to confirm and fix the vulnerability in an expedient manner prior to public disclosure. Consequently, we minimized the chances of an exploit and have determined that Akamai customers are now not vulnerable to SLOTH.

Akamai SIRT Alerts

Akamai SIRT Alerts

January 12, 2016 6:00 AM

How Web Applications Become SEO Pawns

Akamai's Threat Research Division has identified a sophisticated search engine optimization (SEO) campaign that uses SQL injections to attack targeted websites. An advisory on the subject, written by Ryan Barnett of the company's cloud security intelligence team, is available here.

Akamai SIRT Alerts

Akamai SIRT Alerts

January 7, 2016 7:11 AM

Delegate v9.9.13 setuid Binary Vulnerability

By Larry W. Cashdollar, Akamai SIRT A few weeks ago I noticed a tweet from someone I have been following off and on for a few weeks. The tweet highlighted an exposed administration panel in a software product called Delegate. The Delegate software is described as, "a multi-purpose application-level gateway, or a proxy server which runs on multiple platforms (Unix, Windows and MacOS X)". What this software does is allow

Les Waltman

Les Waltman

January 6, 2016 1:27 PM

The move to an Encrypted Web

It wasn't too long ago that the only reason a site would leverage HTTPS was to encrypt sensitive data so it couldn't be read in transit. Times are changing and the Internet as we know it is moving more and more towards encrypting all website traffic. Below are 7 good reasons to move your website to only use HTTPS.

Miguel Serrano

Miguel Serrano

December 21, 2015 2:07 PM

WAF: Ease of management

In my last articles I introduced the idea of how simple is the concept of a WAF (although implementing a reliable WAF system is not that simple), what are false positives and false negatives and the best approach to trade-off between them, what is the impact of wide visibility when it comes to build a WAF, the importance of having a solid team of experts backing up a WAF solution,

Miguel Serrano

Miguel Serrano

December 18, 2015 11:18 AM

WAF: Adequate scale

Let's move on with our analysis of the ideal WAF requirements. Scale is, without a doubt, one of the most important requirements of an effective WAF. Scale has to be considered from two perspectives: under standard traffic conditions and under unusually high levels of traffic. Let's look at each one.

Martin McKeay

Martin McKeay

December 18, 2015 10:27 AM

How 2015 Security Trends Will Influence 2016

I've always hated security 'predictions'; they range from scientific guesses to self-serving marketing drivel, trending mostly towards the latter. But they do serve a purpose when done right, in that they draw attention to the trends currently happening and how they might play out in the future. Given that there's been more focus on the field of computer security in 2015 than in any year before, it's probably not a