Get In Touch
The State of the Internet Security report by Akamai is issued four times a year with information on the types of online attacks that Akamai Technologies protects its customers from every day. In this free report, you can read about changes in Distributed Denial of Service (DDoS) attacks with multiple different metrics. In addition, we look at the various types of web attacks against our customers and a spotlight on
Today Akamai released the Q4 2015 State of the Internet Security (SOTI Security) Report (download here). I'll write posts throughout the week focusing on specific parts of the report, but let's begin with an overview in the form of an infographic. Related: Q4 2015 SOTI Security presentations at RSA Conference 2016
Today, as RSA Conference 2016 opens, Akamai is releasing its Q4 2015 State of the Internet Security Report. At the Akamai Booth in Moscone Center's North Exhibit Hall, I'll give overviews of the report and we'll hand out printed copies. If you want to check out a presntation, here's the schedule: Tuesday - 10 -6, noon and 3 p.m. PT Wednesday - 10-6, noon and 4 p.m. PT Thursday -
Over the last several years, many users have adopted mobile devices, including smartphones and tablets, as their primary means of accessing the Internet. A number of studies published over the past year illustrate this trend, especially among millennials. In addition, improvements to, and greater deployment of this technology by mobile network providers have led to mobile connection speeds that rival fixed broadband connections in some geographies. LTE-Advanced, which is
This is the final preview for the Q2 2015 State of the Internet Security Report, which comes out tomorrow. Here, we take a look at web application attacks and the impact that comes with adding two attack types to the picture. Note: We'll show the actual percentages for these attacks once the report is officially released. One more day! Previews for the Q2 State of the Internet Security Report:Tor Pros
The Q2 2015 State of the Internet Security Report (SOTI Security) is due out in the next couple of weeks, and today we continue previewing various sections. Tuesday we told you about security risks that come into play when third-party plug-ins are used with Wordpress. Yesterday we looked at attack vectors the bad guys favored in Q2. Today we look at the security risks businesses face when using Tor.
The Q2 2015 State of the Internet Security Report (SOTI Security) is due out in the next couple of weeks, and today we continue previewing various sections. Yesterday we told you about security risks that come into play when third-party plug-ins are used with Wordpress. Today we look at attack vectors the bad guys favored in Q2.
The Q2 2015 State of the Internet - Security Report (SOTI Security) is due out in the next couple of weeks, and today we begin previewing various sections. Let's begin with the potential security risks that come into play when third-party plug-ins are used with Wordpress. WordPress is the world's most popular website and blogging platform. Its ever-growing popularity makes it an attractive target for attackers who aim to exploit hundreds
This month we'll release the Q2 2015 State of the Internet Security Report. Tomorrow, we'll begin previewing sections of that report in this blog.But before we begin, a look back at the previous quarter's report is in order. Such a review will better position readers to digest the new report and do some comparing and contrasting. Every report highlights a new trend, but we also see things that don't change