Get In Touch
Starting next week, I'm beginning a series on Akamai InfoSec compliance efforts. It's an extensive effort to be sure, and customers probably ask us more about it than anything else. The first post will be about our process for getting customers the answers they need. From there, I will delve into the following (in no particular order): Akamai InfoSec and the challenges of ISO 27002 How ISO compliance shaped Akamai security
Chief Security Officer Andy Ellis gives a brief overview of security and compliance and what they mean to Akamai. Andy's overview includes common terms along with definitions and an overview of common standards and their components.
Yesterday was the second Tuesday of the month, which those of us in security know as Patch Tuesday -- the day Microsoft unloads its security updates. It's an important calendar item for Akamai customers, given how dominant Windows machines are in many companies. What follows is the full November 2013 update. Please review, see which are most important in your network, and deploy. Bulletin IDBulletin Title and Executive SummaryMaximum Severity
Last week, I began making compilations of Akamai InfoSec's multimedia content. This post is the final roundup of videos we've released thus far.For the compilation of Akamai security podcasts, go here. For the first installment of videos, go here.Now for more videos: Major Areas of Technology within Security In this Akamai InfoSec video tutorial, Security Intelligence Director Joshua Corman gives an overview of major areas of technology within security.
A few weeks ago I wrote about our efforts to develop a section for the Akamai website that's all security, all the time. Here's an update.First, a summary: This section will allow InfoSec practitioners to access all our security content in one place. There will be easier access to the security blog posts, podcasts and videos we already produce daily as well as such new content as slideshows, infographics, research papers
Akamai is constantly looking for ways to improve the security of our platform and protect our clients' traffic. We're currently looking into an encryption mechanism called Perfect Forward Secrecy, or simply Forward Secrecy. We prefer to use the term "Forward Secrecy" because nothing in security is perfect and we'd rather not imply that it could be. Akamai plans to include Forward Secrecy as a capability our customers can start using
Several readers have asked me where they can find all our podcasts and videos. Our soon-to-be-released security microsite will make everything easy to find. But for now, we're creating a series of round-ups. Yesterday we published the first six podcast episodes. Further down the road, we'll have a round-up of our security webinars. What follows is the first compilation of videos. What's a Zero-Day Vulnerability? Akamai Chief Security Officer Andy Ellis gives
In Episode 6 of the Akamai Security Podcast, I continue my discussion with CSIRT Director Michael Smith. In this installment, Mike describes the process by which CSIRT delivers daily threat intelligence to our customers, along with the defensive measures needed to block attacks.--Listen to the podcast HEREBio: Michael Smith is a senior security manager with more than 20 years of experience in the IT security and intelligence fields performing security design and engineering,
For the third and final episode of our webinar series on Web security for small and medium businesses, Security Ledger Editor-in-Chief Paul Roberts joins me for a discussion on holiday-themed threats and strategies SMBs can adopt to fight back.