Get In Touch
Akamai Chief Security Architect Brian Sniffen reviews the evolution of TLS/SSL during a presentation at Akamai Edge 2014. Following the Heartbleed vulnerability, attention turned to TLS, the fundamental building block of Internet encryption and authentication. Sniffen reviewed the evolving TLS standard, including new ciphers, authentication mechanisms and asymmetric key changes.
Last time in our "Preparing for the Holidays" series, we focused on what you should know about mobile trends. And as promised, we're back at it with some more trends you should be aware of. This time, it's all about security. If security hasn't been top of mind in the past, it certainly is (or should be) now, given the number of high-profile breaches we've seen over the past
In this latest episode, I talk to Akamai Security Advocates Dave Lewis and Martin McKeay about the increased frequency of severe vulnerabilities affecting SSL and related technology.We start with the most recent case, Poodle, and move on to Shellshock and Heartbleed. A full list of resources for all of these incidents can be found here.We also look ahead to potential security trends in 2015.Listen here.
Akamai's Prolexic Security Engineering & Research Team (PLXsert) issued a new advisory Monday that provides a full analysis of the Poodle vulnerability, including actions companies can take to blunt the impact. It's the latest in a series of postings Akamai has done to keep the public informed of its Poodle response. In addition to reviewing this new advisory, please refer to the following posts as well: Poodle FAQ: What Akamai
CAMBRIDGE, Mass. - October 23, 2014 - Akamai Technologies, Inc. (NASDAQ: AKAM), the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today announced availability of the Q3 2014 State of the Internet - Security Report. Akamai's Prolexic Security Engineering and Research Team (PLXsert) is a recognized leader in Distributed Denial of Service (DDoS) protection services and strategies. This quarter's report, which provides analysis and insight
Today we've launched the first all-security edition of the State of the Internet report. State of the Internet also has its own website now, where readers can delve into Akamai's threat intelligence, threat advisories, data visualizations and more. Highlights of the security edition for Q3 2014 include a four-fold year-over-year increase in DDoS attack size and volume; new attacks targeting hand-held devices and the proliferation of easy-to-use attack tools. Download
In the latest episode of the Akamai Security Podcast, I talk to CSIRT Manager Mike Kun about what he calls an "interesting new attack vector" where bad actors forgo direct attacks against websites in favor of targeting third-party services the site is using. "Rather than go against a target directly, bad actors are looking at what other services that website is using," Kun explains. "A simple one is DNS. If
It's been a year of major security vulnerabilities. Last week we worked to mitigate the Poodle vulnerability. Two weeks before that was Shellshock and in April we had Heartbleed. All have shaken the security industry to the core, and Akamai staff have spent countless hours working to protect customers against these threats.To get a wider perspective of our actions in the face of such incidents, here's a collection of resources
The Boston Application Security Conference (BASC) was this past weekend, and Patrick Laverty from Akamai InfoSec's CSIRT team gave a talk called "How Hackers View Your Web Site." Patrick recorded the talk and posted it on his YouTube channel. Like everything he does, it's quite good. So I'm sharing it here. Laverty described his talk this way:"As defenders, we have to be right 100% of the time where an attacker