Akamai Diversity

The Akamai Blog

Akamai

Akamai

November 6, 2013 6:13 AM

Podcast: Akamai CSIRT Director Michael Smith, Part 2

In Episode 6 of the Akamai Security Podcast, I continue my discussion with CSIRT Director Michael Smith. In this installment, Mike describes the process by which CSIRT delivers daily threat intelligence to our customers, along with the defensive measures needed to block attacks.--Listen to the podcast HEREBio: Michael Smith is a senior security manager with more than 20 years of experience in the IT security and intelligence fields performing security design and engineering,

Bill Brenner

Bill Brenner

November 5, 2013 6:39 AM

Webinar: Preparing Your Web Security Strategy

For the third and final episode of our webinar series on Web security for small and medium businesses, Security Ledger Editor-in-Chief Paul Roberts joins me for a discussion on holiday-themed threats and strategies SMBs can adopt to fight back.

Bill Brenner

Bill Brenner

November 4, 2013 1:32 PM

Webinar: Threats and Defenses for Smaller Businesses

Steve Ragan, a former hacker and current staff writer for CSOonline.com, joins me in part two of our series on Web security for small and medium businesses. The focus of this episode is on hacking techniques, attacks and defenses.

Andy Ellis

Andy Ellis

November 1, 2013 9:08 AM

Whither HSMs

Hardware Security Modules (HSMs) are physical devices attached or embedded in another computer to handle various cryptographic functions. HSMs are supposed to provide both physical and logical protection of the cryptographic material stored on the HSM while handling cryptographic functions for the computer to which they are attached. As websites move to the cloud, are HSMs the right way to achieve our goals? Before we talk about goals, it is

Bill Brenner

Bill Brenner

November 1, 2013 4:34 AM

Twitter Chat: Protecting Critical Infrastructure

Yesterday, Akamai InfoSec participated in a second Twitter forum as part of National Cyber Security Awareness Month. Participants supplied a ton of great resources, which I think is worth sharing here. See last week's Twitter chat about cybercrime defenseWhat follows are some of the tweets from the conversation. If you want to better understand the threats to critical infrastructure and what's being done about it, you'll find what follows useful.14hbaber @baberI was on

Bill Brenner

Bill Brenner

October 31, 2013 7:21 AM

Webinar: Internet Security for Small & Medium Busine ...

This month, I've been hosting a three-part webinar series on the challenges smaller companies face when it comes to Web security. This week and next, I'm presenting the recordings here. WellStar Health System Security Director Martin Fisher joined me for part 1: "What Web Security Means for Small & Medium Businesses."

Bill Brenner

Bill Brenner

October 30, 2013 5:10 AM

Video: What's a Zero-Day Vulnerability?

Akamai Chief Security Officer Andy Ellis gives a whiteboard lesson on zero-day vulnerabilities. Class is in session:

Akamai

Akamai

October 29, 2013 9:17 AM

Podcast: Akamai CSIRT Director Michael Smith

In Episode 5 of the Akamai Security Podcast, I interview CSIRT Director Michael Smith. We discuss the role of CSIRT in researching threats and vulnerabilities, as well as keeping customers and the wider public informed of defensive measures they can take.--Listen to the podcast HEREBio: Michael Smith is a senior security manager with more than 20 years of experience in the IT security and intelligence fields performing security design and

Bill Brenner

Bill Brenner

October 28, 2013 6:52 AM

Web Shells, Backdoor Trojans and RATs

Akamai's CSIRT team advises companies to check their systems for Web shells, executable code running on a server that gives attackers remote access to a variety of critical functions. Online adversaries can install Web shells by compromising legitimate Web applications on a server, using such tried-and-true techniques as SQL injection, Remote File Inclusion, an unvalidated file upload feature or through a valid user's stolen credentials. Here are the basics of