Get In Touch
By Danny Wasserman The folks on the Akamai Professional Services team are the people who help implement, configure, and tune the cloud security products that protect our customers' web applications from the daily onslaught of bots blasting login attempts against their websites, mobile apps, and APIs. We decided to take a look at some popular tools used by threat actors to launch these credential abuse attacks and what can be
Originally Published: https://blogs.akamai.com/jp/2018/09/post-9.html Generation Z and New Challenges in the Education Field The youth of Generation Z grew up with Windows 2000 and XP, and many played with iPhones, iPads, and Android products. Known as digital natives, they are an essential part of today's educational landscape -- where cloud, mobile, and social networks form the infrastructure for their daily lives. For them, the Internet itself may seem more relevant than
The Domain Name System (DNS) is one of the Internet's fundamental systems, providing the top-level hierarchy for naming Internet resources. One of its purposes is to act as a sort of phonebook, allowing names such as "www.example.com" to be resolved to resource information, such as server IP addresses. It provides the hierarchical naming model that enables clients to "resolve" or "lookup" resource records associated with names. This naming hierarchy also
It's that time of year again. Here at our global headquarters in Cambridge, Massachusetts, the days are getting shorter (at least in terms of sunrise and sunset). Gone are the 90 degree days of summer; 60 is the new normal. And as we are now in the midst of the final months of the year, Starbucks is bringing back its Pumpkin Spice Latte. Just kidding...that happened in August. Here in
by Don Ng and Greg Burns This October, Akamai is announcing the turn-up of two additional Prolexic DDoS mitigation scrubbing centers in Singapore and Osaka, building on the nine previous scrubbing centers turned up this year and adding to our existing APJ footprint in Sydney, Tokyo, and Hong Kong. The new regional centers add approximately 800 Gbps to the Prolexic platform's bandwidth to 7.8 Tbps of dedicated attack mitigation capacity.
by Volker Tegtmeyer and Hans Cathcart Have you ever felt like you did a great job protecting your mission-critical web applications, only to realize so many more web properties require your attention? Web properties are not all equal, and overloaded security teams can only focus on the most critical ones. As a result, there have been several evolving consequences for many organizations:
Todays comprehensive monitoring capabilities in Security Center provide great insight into bot activity and countermeasures applied across your valuable web properties. Filter options allow you to focus on almost any desired detail. However, understanding what is happening on specific protected endpoints requires an understanding of not only Web Security Analytics, but also how you should translate a specific question into a sequence of filters. This can be tedious for a
The rise of credential stuffing attacks globally is made possible by the tendency of customers' re-using the same credentials across different websites and attackers' easy access to stolen credential lists.
Credential stuffing, and the botnets behind this activity, is the primary focus of the State of the Internet Security Report, Issue 4, 2018. Credential stuffing, the use of botnets to try to login to a site with stolen or randomly created login information, isn't a new phenomenon, but it is one that is having a growing impact, especially on financial services organizations. Our latest report takes a deeper look at