Get In Touch
I've often heard the following question (or variants thereof): How do I secure [this thing]? Such a question rarely lends itself to a quick answer -- in almost all cases it prompts further questions: secure what, against what, in what cases, from whom? What options are you considering, and how will they help? Akamai InfoSec uses the Principals-Goals-Powers-Controls rubric to ask and answer these questions, and in so doing, help
Part 2 in a series.In my post about compliance and customer service, I briefly touched on one of the goals of Akamai InfoSec -- making as much of our compliance documentation public as possible. I want to spend a little more time talking about that, as it's something I'm increasingly involved with.Also, customer feedback is going to be crucial in determining which documents to tackle first.As I mentioned in the
This week I participated in an online panel put on by the Information Security Buzz website. I got the following question: What 2 things are most likely to change the security industry in the next 2 years? And why? The question immediately made me think of the state of privacy. My full answer is here. As to the privacy issue, I answered: After 9-11, privacy got shafted in the rush
More than a month has passed since Akamai Edge 2013. Security was a major theme this year, and in this post I want to direct you toward the presentations now available on the Akamai Edge page. For the video presentations, click here. Below are some of the slide decks from those presentations. "Big Data Intelligence," by Or Katz, Principal Security Researcher, and Tsvika Klein, Security Product Manager"Closing the Loop on
Part 1 in a series. For more information, see "Everything You Want To Know About Akamai Security & Compliance."The process to address customer security and compliance questions used to be somewhat chaotic. Questions would float around in random emails and elsewhere, and which ones got answered was a luck of the draw. We found this unacceptable, and did something about it.In an interview last week, Akamai InfoSec Program Manager Meg
Starting next week, I'm beginning a series on Akamai InfoSec compliance efforts. It's an extensive effort to be sure, and customers probably ask us more about it than anything else. The first post will be about our process for getting customers the answers they need. From there, I will delve into the following (in no particular order): Akamai InfoSec and the challenges of ISO 27002 How ISO compliance shaped Akamai security
Chief Security Officer Andy Ellis gives a brief overview of security and compliance and what they mean to Akamai. Andy's overview includes common terms along with definitions and an overview of common standards and their components.
Yesterday was the second Tuesday of the month, which those of us in security know as Patch Tuesday -- the day Microsoft unloads its security updates. It's an important calendar item for Akamai customers, given how dominant Windows machines are in many companies. What follows is the full November 2013 update. Please review, see which are most important in your network, and deploy. Bulletin IDBulletin Title and Executive SummaryMaximum Severity
Last week, I began making compilations of Akamai InfoSec's multimedia content. This post is the final roundup of videos we've released thus far.For the compilation of Akamai security podcasts, go here. For the first installment of videos, go here.Now for more videos: Major Areas of Technology within Security In this Akamai InfoSec video tutorial, Security Intelligence Director Joshua Corman gives an overview of major areas of technology within security.