Akamai Diversity

The Akamai Blog

Bill Brenner

Bill Brenner

September 24, 2014 6:04 AM

Good Recognition for Akamai's Real-Time Web Monitor

Analyst Daniel Humphries has written a review of several threat monitoring tools for the "Software Advice" website, including a positive assessment of Akamai's Real-Time Web Monitor. Ours was among five tools Humphries looked at in his report, "Spotlight: Threat Visualizations." The others were Kaspersky's Cyberthreat Real-Time Map, Digital Attack Map -- a joint project between Google and security vendor Arbor Networks -- the Deutsche Telekom Attack Meter, and Trend Micro's

Bill Brenner

Bill Brenner

September 23, 2014 5:40 AM

Coming Soon: New Security Whiteboard Videos

Last year, we released a bunch of videos containing security whiteboard lessons on a variety of topics. This Thursday we shoot four new episodes. Below is a preview of each episode.To see previous security whiteboard videos, go here and here.

Bill Brenner

Bill Brenner

September 22, 2014 5:36 AM

Security Topics at Akamai Edge 2014: A Primer

Each year at Akamai Edge we update customers on some of the more persistent threats we've dealt with in the 12 months prior. Slides detailing the 2013 threat picture are available here. For an idea of what we'll be sharing at Edge 2014 in a couple weeks, I've assembled this primer. The following blog posts capture the main threats that have kept us busy in recent months:

Bill Brenner

Bill Brenner

September 18, 2014 5:25 AM

Public Compliance Docs: The List So Far (Updated Sep ...

As previously noted, Akamai InfoSec has been working to make its most sought after compliance documents publicly available. The goal is to make it easier for customers to access the answers they regularly seek, and also to show potential new customers how we operate. We're building the foundation in the form of a compliance page on the Akamai Security microsite, and hope to publish up to two fresh public docs a month. What follows is

Bill Brenner

Bill Brenner

September 16, 2014 6:22 AM

Web Vulnerabilities: Low-Hanging Fruit for DDoSers

A new Akamai PLXsert whitepaper was released this morning: "Web Vulnerabilities: The foundation of the most sophisticated DDoS campaigns." The paper can be downloaded here. Security practitioners know this much from long experience: Attackers who successfully build botnets and launch DDoS campaigns start by exploiting web vulnerabilities. It is the low-hanging fruit. In the white paper, PLXsert explores specific examples of the exploitation of popular web content management systems and web management

Bill Brenner

Bill Brenner

September 15, 2014 4:36 AM

Akamai Edge 2014 and National Cyber Security Awarene ...

It's fitting that the Akamai Edge customer conference is in October. It's the same month as National Cyber Security Awareness Month, and we'll have a robust security track at Edge.

John Summers

John Summers

September 9, 2014 12:00 PM

How to evaluate a DDoS mitigation solution

How fast could your IT team stop a DDoS attack? IDG Research found that it takes an average of 10 hours before a company can even begin to resolve an attack. On average, an attack isn't detected until 4.5 hours after its commencement and typically an additional 4.9 hours passes before mitigation can commence. With outage costs averaging $100,000 per hour, it means that a DDoS attack can cost an

Akamai

Akamai

September 9, 2014 6:00 AM

Podcast: Tom Leighton on Danny Lewin, Akamai's Secur ...

Last year I launched the Akamai Security Podcast. Episode 1 was an interview with Akamai CEO Tom Leighton, who discussed the legacy of Co-Founder Danny Lewin, Akamai's role on 9-11-01, and his vision of Akamai as a major player in the security industry. This week being the anniversary of 9-11, it seems appropriate to re-share. Listen HERE.Related content: 9-11 Anniversary: Danny Lewin's Life and Legacy Internet Security Central To Danny Lewin's

Bill Brenner

Bill Brenner

September 4, 2014 11:29 AM

Akamai Offers Further Guidance to Blunt Linux DDoS T ...

Yesterday's advisory about attackers exploiting Linux vulnerabilities for DDoS assaults got a lot of attention. After hearing the feedback, we decided a follow-up post was necessary to help admins mount a better defense.I spoke with David Fernandez, head of our Prolexic Security Engineering Research Team (PLXsert), and he offered additional details on the countermeasures. First, for the basic details of the threat, check out yesterday's post. Now for the next steps...