Akamai Diversity

The Akamai Blog

Bill Brenner

Bill Brenner

January 7, 2014 7:37 AM

Why I'm Attending ShmooCon 2014

Here at Akamai, we're busy preparing for RSA Conference 2014. It's the biggest security conference of the year, and we send a platoon of employees every time. Given our role in securing the Internet, it's a no-brainer.But there are many other conferences we attend each year, because:We have a lot of information to share about attacks against Akamai customers and how the security team continues to successfully defend against them.We

Or Katz

Or Katz

January 6, 2014 11:30 AM

Analyzing a Malicious Botnet Attack Campaign Through ...

Two of the most prominent evolutions in the web application attacks landscape are scale and volume. Nowadays, attackers use tremendous amounts of computing resources such as those provided by cloud computing and botnets, in order to mount distributed large-scale attack campaigns over the Internet while keeping their identity hidden. From a security defense point of view, such attacks are a nightmare - they are much harder to detect and

Bill Brenner

Bill Brenner

January 6, 2014 7:07 AM

Security Predictions? Here Are Some Facts About 2014

I've said it before and will repeat it here: I absolutely loathe security predictions. I have nothing against those who make them. It's just that most predictions are always so much duh. The rest are marketing creations that have no attachment to reality. Examples of the self evident:Mobile malware is gonna be a big deal.Social networking will continue to be riddled with security holes and phishing attacks.Microsoft will release a lot

Akamai

Akamai

December 19, 2013 5:11 AM

Akamai Security Podcast: All The Episodes, Expanded

A round-up of the first nine episodes of the Akamai Security Podcast:Episode 1: CEO Tom Leighton discusses the legacy of Co-Founder Danny Lewin, Akamai's role on 9-11-01, and his vision of Akamai as a major player in the security industry.Episode 2:  I talk to Meg Grady-Troia about her role in Akamai InfoSec, particularly the security training she does for new hires. Episode 3: I talk to Larry Cashdollar, a senior security response engineer on our CSIRT team. Larry

Bill Brenner

Bill Brenner

December 18, 2013 5:19 AM

Akamai Security Compliance: The Story So Far

Continuing our weekly series of security anthologies, we focus today on Akamai compliance procedures. We're currently in the midst of an ongoing series on how Akamai approaches it, but the following content presents the story thus far. Four Things to Ask Before Seeking FedRAMP Certification For a look at how we reached FedRAMP certification, I spoke with Akamai InfoSec's Kathryn Kun, the program manager who played a critical role in

Bill Brenner

Bill Brenner

December 17, 2013 5:25 AM

Security at Planetary Scale: An Anthology

We continue this week's series of anthologies with a collection of posts about security at planetary scale.Environmental Controls at Planetary ScaleEach data center in a planetary scale environment is now as critical to availability as a power strip is to a single data center location.  Mustering an argument to monitor every power strip would be challenging; a better approach is to have a drawer full of power strips, and replace

Bill Brenner

Bill Brenner

December 16, 2013 6:35 AM

Attack Techniques and Defenses: An Anthology

Akamai's security team defends customers from a variety of threats 24 hours a day, seven days a week. You name it: DDoS attacks, DNS-related attacks, vulnerability exploitation -- we've seen it all. What follows is a collection of posts focusing on attack techniques and the defenses we have deployed and/or suggested. Indonesian Attack Traffic Tops List; Port 445 No Longer Main TargetIndonesia replaces China as the top producer of attack

Bill Brenner

Bill Brenner

December 12, 2013 9:03 AM

Akamai CSIRT Warns of DNS Record Hijacking

In recent weeks, Akamai's CSIRT team has seen the Web sites of multiple businesses redirected after being hijacked by a malicious user. CSIRT's Patrick Laverty, who authored the advisory, said the intent of these hacks can include the redirection and capture of all company email to a rogue server, or to simply cause embarrassment to the company being affected.For more on this topic, see "The DNS Security Collection"The problem is

David Senecal

David Senecal

December 11, 2013 12:09 PM

Anomaly scoring is a better way to detect a real att ...

0 0 1 220 1259 Akamai Technologies Inc. 10 2 1477 14.0 Normal 0 false false false EN-US JA X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:Cambria; mso-ascii-font-family:Cambria; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Cambria; mso-hansi-theme-font:minor-latin;} The following is a guest post from Principal Enterprise Architect David Senecal and Principal Product Architect Ory Segal. Internet security is constantly evolving and