Let's make one thing absolutely clear at the outset: the time to think about the best options for cyber-threat mitigation is NOT when your network is being attacked. In the best-case scenario you will already have a mitigation strategy in place for defending against both network-layer and application-layer attacks. The most important thing to know when you are building a multi-layered approach to securing web applications is that security solutions aren't one-size-fits-all. You have several options to mix and match. Akamai's free eBook, "Threats and Mitigations: A Guide to Multi-Layered Web Security", gives you options for making the choices that best fit both your business and IT infrastructure requirements.
Get In Touch
Recently in Web Security Category
The data center perimeter is dead - web assets cannot be protected by a fortress wall - but a historical view of web protection lives on in the way many IT departments continue to defend their infrastructures. Websites and web applications increasingly live outside the data center. Cloud-based applications and websites are at constant risk from web threats that are becoming more damaging and sophisticated by the day.
As previously noted, Akamai InfoSec has been working to make its most sought after compliance documents publicly available. The goal is to make it easier for customers to access the answers they regularly seek, and also to show potential new customers how we operate.
We're building the foundation in the form of a compliance page on the Akamai Security microsite, and hope to publish up to two fresh public docs a month. What follows is a list of what we've done so far.
Microsoft released its August 2014 Security Update Tuesday. The company's OneNote note-taking software, Internet Explorer browser, Server software, and .NET Framework were most affected this time.
- Listen to the full episode HERE.