Get In Touch
For app developers who use or are looking to use Akamai application acceleration services, we've provided the following information to help you understand how our services comply with Apple iOS 9 App Transport Security (ATS) requirements. Helpful Links:Apple release notesATS requirement detailsPre-iOS9 app behavior
Written by Bill Brenner, senior tech writer in the Akamai SIRTAkamai has officially launched a new Security Intelligence Response Team that combines the resources of Akamai's CSIRT and Prolexic's PLXsert teams, further integrating Prolexic and Akamai security research.Akamai SIRT is a dedicated group of cyber threat researchers, analysts and incident responders that monitors malicious cyber threats globally and analyzes these attacks using proprietary techniques and equipment. Through research, digital forensics, real
A quick scheduling note ahead of Akamai Edge 2015: I'll be moderating a panel with fellow Akamai security researchers about the various trends we've been tracking in the last 12 months. If you're at Edge, please join us.Security Threat Landscape - A Year in review Description: The more you know about the security threat landscape and the mindset of malicious attackers, the stronger your cloud security strategy defense can be.
Akamai Security Intelligence Response Team (SIRT) researchers Larry Cashdollar and Chad Seaman have spent months researching vulnerabilities in plug-ins often used with Wordpress. The results of that research are outlined in the Q2 State of the Internet Report, and an excerpt on the section can be found in this Akamai Blog post. In the following post, Larry shares some tips for researching Wordpress plug-ins.***By Larry Cashdollar, Senior Security Intelligence Response
Today is the 14th anniversary of the Sept. 11, 2001 terrorist attacks. To mark the occasion, I'd like to share this post from 2013, in which Akamai CEO Tom Leighton and CSO Andy Ellis share memories of co-founder Danny Lewin -- including his tragic death aboard American Airlines Flight 11 that tragic day. They shed more light into Akamai's actions that day, which kept the Internet running in the face of
Scheduling note: I'll be moderating a keynote panel at the Cloud Partners Conference in Boston Wednesday, Sept. 16. The conference is Sept. 16-18 at the Hynes Convention Center.Panel details:Time: 12:30 - 1:30 p.m.Topic: Cloud Risk: Hype Vs. RealityDescription: We'll discuss security best practices in the cloud and hear what is and isn't working for different companies. The ultimate lesson: Cloud security is attainable.Moderator: Bill Brenner, Senior Tech Writer, Akamai Security
Next month, I'll be at the Akamai Edge customer conference. It's a terrific opportunity to meet face-to-face with a lot of our customers and get their feedback on what's working for them and what we can improve upon. A robust Web Security track of talks is planned, and I'll be blogging about it. The security track will run each day of Edge. Here's a tentative look at some of the discussions we have
In January, we told you about Lizard Squad, an attack group that ruined Christmas for a lot of Sony Playstation and Xbox users by launching DDoSes against those gaming networks. The authorities have been chasing them down since then, and this month six teens were arrested for using Lizard Squad's signature Lizard Stresser DDoS attack tool.
There can sometimes be a fine line between suspicion and guilt. Determining malicious or "good" activity can be a challenging task in today's cyber world full of hidden and dark secrets. A system based on accuracy and thorough analysis of all evidence will lead to the true malicious actor. Consider a popular way to illegally extract money from someone's bank account for example. The malicious actor has created a