Get In Touch
Bsides Boston 2014 -- scheduled for Friday and Saturday at the Microsoft New England Research & Development (NERD) Center -- promises to be another enlightening event. Akamai is a gold sponsor, and I'll be there both days. If you're thinking of going, here's the full agenda to consider:
Internet Explorer users take note: Microsoft issued an emergency security update yesterday to address a serious, widely-publicized vulnerability. Dustin C. Childs of Microsoft's Security Response Center announced the fix in a blog post yesterday.
Akamai released its Fourth Quarter 2013 State of the Internet Report last week. Security highlights include the following: DDoS traffic increased 23 percent quarter-over-quarter, up by 75 percent from fourth quarter 2012.Enterprise and commerce continued to be the industries targeted most frequently.China remained the top producer of attack traffic, growing to 43 percent of observed attack traffic.The United States also saw significant growth in observed attack traffic, while Indonesia's contribution
Akamai recently released the Prolexic Q1 2014 Global DDoS Attack Report. What follows are some of the key points, including a 114-percent increase in the average peak bandwidth of attacks.Download the full report HERE
Good news: I got another look at how well Akamai's security procedures work. Bad news: It's because I made two simple mistakes. And I knew better.
The Akamai Prolexic Security Engineering & Response Team (PLXsert) has discovered a new tool attackers could use to target Microsoft Windows. The PLXsert advisory describes it this way: The Storm kit is capable of infecting Windows XP (and higher) machines for malicious uses, including execution of DDoS attacks. Once a PC is infected, the Storm Network Stress Tester crimeware kit establishes remote administration (RAT) capabilities on the infected machine, enabling
This year, we decided to do something a little different to accompany the year-end State of the Internet Report. In addition to the analysis we do on the numbers for the world as a whole, we're breaking out a particular region to look at in more detail. Although it is not the target of the largest number of attacks, we chose Europe because, like the rest of the world,
One of the most interesting aspects of working at Akamai is the sheer volume of opportunities within the company. Since I started here in my own role last July I have had no end of interesting challenges that have managed to keep me thoroughly engaged. Akamai is a company that allows you to grow and never has a shortage of amazing projects to work on. This sort of excellent working environment invariably brings
In the interest of providing an update to the community on Akamai's work to address issues around the Heartbleed vulnerability, we've put together this outline as a brief summary: Akamai, like all users of OpenSSL, was vulnerable to Heartbleed. Akamai disabled TLS heartbeat functionality before the Heartbleed vulnerability was publicly disclosed. In addition, Akamai went on to evaluate whether Akamai's unique secure memory arena may have provided SSL key protection