Get In Touch
The Q2 2015 State of the Internet Security Report (SOTI Security) is due out in the next couple of weeks, and today we continue previewing various sections. Tuesday we told you about security risks that come into play when third-party plug-ins are used with Wordpress. Yesterday we looked at attack vectors the bad guys favored in Q2. Today we look at the security risks businesses face when using Tor.
The Q2 2015 State of the Internet Security Report (SOTI Security) is due out in the next couple of weeks, and today we continue previewing various sections. Yesterday we told you about security risks that come into play when third-party plug-ins are used with Wordpress. Today we look at attack vectors the bad guys favored in Q2.
The Q2 2015 State of the Internet - Security Report (SOTI Security) is due out in the next couple of weeks, and today we begin previewing various sections. Let's begin with the potential security risks that come into play when third-party plug-ins are used with Wordpress. WordPress is the world's most popular website and blogging platform. Its ever-growing popularity makes it an attractive target for attackers who aim to exploit hundreds
This month we'll release the Q2 2015 State of the Internet Security Report. Tomorrow, we'll begin previewing sections of that report in this blog.But before we begin, a look back at the previous quarter's report is in order. Such a review will better position readers to digest the new report and do some comparing and contrasting. Every report highlights a new trend, but we also see things that don't change
I was ready for a relaxing vacation on the Mexican Riviera Maya where the warm waters and cool drinks would provide the backdrop for a great week. Making the Internet fast, reliable and secure every day is demanding work so I was happy to temporarily leave my thoughts about Akamai at home, spend quality time with family, and sneak in a book that I've been wanting to read for a
Last night I watched an On Demand episode of The American Experience titled Blackout, which recounted the 1977 power failure in New York City and its lasting impact on city due to widespread looting and destruction. With the power completely out, the operators at Con Ed got to work restoring power using a manual that was last updated after another massive blackout - in 1965.
Late last month I attended the Future Stores 2015 conference in Seattle. If you haven't heard of Future Stores before, here's some brief background: it's held by Worldwide Business Research and brings together retail, omni-channel, customer web experience, and IT execs to focus on in-store innovation and how to bridge the digital and physical retail environments. As Chief Strategist of Commerce at Akamai, I was excited to learn how
In June 2012, Akamai launched the Akamai Internet Observatory (IO) destination site that highlights browser usage across desktop and other connected devices. The data presented in the full Q1 2015 State of the Internet ReporBe and this blog post are derived from the Akamai IO site.
HTTP is ubiquitous. Seems like everything today is being served from the web. We are using smartphones to do everything from answering our doorbells while we are at work to remotely controlling SUV's. All of this, happening on a platform we call the World Wide Web. Websites are delivering richer and more personalized content than ever before, creating user experiences that were never conceived of. This means, more than ever,