Akamai Diversity

The Akamai Blog

Meg Grady-Troia

Meg Grady-Troia

August 9, 2013 8:14 AM

DefCON Observations from a First-Timer

In April of this year, InfoSec launched a new team called Customer Compliance. Several senior InfoSec employees joined its ranks, and I was hired into the team. My name is Meg Grady-Troia, and I'm a member of Akamai's Customer Compliance team because I am an anthropologist, an educator, and a writer. My job is finding creative and effective ways to begin sharing Akamai's security posture and platform with our customers,

Bill Brenner

Bill Brenner

August 9, 2013 6:17 AM

#FFSec: Security Pros on Twitter Who Will Show You T ...

Those who know me are aware of my fondness for Follow Friday -- a tradition on Twitter where people recognize the folks whose tweets keep them inspired and informed. In my case, the focus is on people in the InfoSec community. I have a list on Twitter that will show you 275 security pros I currently follow. You can see their bios and press the follow button on those you

Bill Brenner

Bill Brenner

August 8, 2013 5:59 AM

Quick Wins with Website Protection Services

Securosis analyst Mike Rothman recently wrote a paper on the benefits of website protection services (WPS). I recommend you give it a read, as it's some of the most descriptive research I've seen on the subject. Content in the report was developed independently of any sponsors and is based on material originally posted on the Securosis blog. It concludes that website protection services can add measurable security to your web presence in

Bill Brenner

Bill Brenner

August 7, 2013 5:05 AM

Carder Gangs Continue Account Takeover Attempts

Akamai InfoSec continues to monitor repeated attempts to hijack the accounts of those doing business with our customers. In this attack, the bad guys reuse credentials they've stolen from other sites to fraudulently acquire merchandise. Attackers use automated tools commonly referred to as account checkers to quickly determine valid user ID and password combinations across a large number of ecommerce sites. The tools help the attackers identify valid accounts quickly

Bill Brenner

Bill Brenner

August 6, 2013 7:59 AM

Four News Reports On Recent DDoS Activity

Since one of Akamai InfoSec's biggest tasks is to blunt the impact of DDoS attacks against customers, I'm always scanning the various tech news outlets to see what's new and who among us is being quoted. Here are four that have caught my attention in recent days -- two of which include insight from Akamai CSIRT Director Michael Smith.DDoS Attackers Change Their Game PlansSmith is quoted in this article about how

Dave Lewis

Dave Lewis

August 5, 2013 11:26 AM

Bypassing Content Delivery Security

As is true of every year at Black Hat there are some talks that catch our attention. Talks range from the well thought out research papers to those of the narcissistic vulnerability pimps. This year was no exception. A talk entitled "Denying Service to DDoS Protection Services" by Allison Nixon is a presentation which fell into the well thought out column. This talk caught our attention for the obvious reason

Bill Brenner

Bill Brenner

August 5, 2013 6:00 AM

Security Reminders Inspired By Van Halen's Brown M&M ...

It's a popular bit of Rock & Roll lore: The band Van Halen conducted a test to make sure its tour contracts were being read, placing in a line saying there were to be no brown M&Ms backstage. Not surprisingly, they found a couple browns and trashed their dressing room in response. The real story is a lot less dramatic. It wasn't about the band playing games with people. It

Andy Ellis

Andy Ellis

August 1, 2013 9:02 AM

Environmental Controls at Planetary Scale

A common set of security control objectives found in standard frameworks (ISO 27002, FedRAMP, et al) focus on environmental controls. These controls, which might focus on humidity sensors and fire suppression, are designed to maximize the mean time between critical failure (MTBCF) of the systems inside a data center. They are often about reliability, not safety[1]; fixating on over-engineering a small set of systems, rather than building in fault tolerance.

Bill Brenner

Bill Brenner

August 1, 2013 2:00 AM

Black Hat 2013: A Point-Counterpoint

An old friend and seasoned veteran of the security industry, Alan Shimel, was quick to pounce on my statement yesterday that there is nothing new happening in security; that we're simply trying to find more effective ways to deal with the same old problems.Alan does make some valid points, especially the argument that there has been advancement on the technology side of things. I was speaking more to the messaging