Get In Touch
I originally wrote this for CSOonline's Salted Hash blog in 2011. But given all my focus on incident management of late, a re-share seems appropriate.You might find it weird that I'd find a teachable infosec moment in my son breaking his arm. But he did do it at a security meet-up, after all.
Earlier this week, we published a new white paper titled, "Weighing Risk Against the Total Cost of a Data Breach," on Akamai.com. Ordinarily, a white paper wouldn't be a particularly interesting subject for a blog post, but this one explores a topic that has generated a lot of questions from our customers - how do I financially justify a Web application firewall solution to my management?
The data center perimeter is dead - web assets cannot be protected by a fortress wall - but a historical view of web protection lives on in the way many IT departments continue to defend their infrastructures. Websites and web applications increasingly live outside the data center. Cloud-based applications and websites are at constant risk from web threats that are becoming more damaging and sophisticated by the day.
Last week I recorded a podcast interview with three of Akamai InfoSec's four summer interns. Due to a schedule conflict, the fourth intern -- Boston University Computer Science major Allan Wirth -- was interviewed separately.Wirth will be a senior this fall and hopes to embark on a career in web security. The work he did for Akamai will serve him well to that end. Under the supervision of InfoSec's
As previously noted, Akamai InfoSec has been working to make its most sought after compliance documents publicly available. The goal is to make it easier for customers to access the answers they regularly seek, and also to show potential new customers how we operate. We're building the foundation in the form of a compliance page on the Akamai Security microsite, and hope to publish up to two fresh public docs a
Microsoft released its August 2014 Security Update Tuesday. The company's OneNote note-taking software, Internet Explorer browser, Server software, and .NET Framework were most affected this time.
In the latest episode of the Akamai Security Podcast, I interview three interns -- Yuan Jiang, Chae Won Lee and Tom Boning. They spent the summer working with our InfoSec team. They talk about their projects and where they hope to go from here.Listen to the full episode HERE.
My friend Adrian Crenshaw of Irongeek.com has pulled off quite a feat -- posting all of BSidesLV's video-recorded presentations. Pretty impressive, since it's barely been a week since the event opened. Go here to watch the full roster of videos. For this post, I want to share the presentation by Akamai's own Patrice Coles, "Third-Party Service Provider Diligence: Why are we doing it all wrong?"
Akamai Security Storyteller Bill Brenner and Akamai Security Advocates Martin McKeay and Dave Lewis report from Las Vegas during Black Hat, BSidesLV and DEF CON. They are joined by special guests Steve Ragan and Gillis Jones.They touch on antivirus pioneer John McAfee's appearances at BSidesLV and DEF CON, security luminary Dan Geer's Black Hat keynote, and try to answer the age-old question: Why go to these events?About our guests:Steve Ragan