Akamai Technologies
Follow
89 Followers
Follow Akamai Technologies on their other social channels!
About Us
Founded:
1998
Company Size:
5001-10000 employees
Company Type:
Public
Location:
Cambridge, MA (HQ) / Global
Website:
If you've ever shopped online, downloaded music, watched a web video or connected to work remotely, you've probably used Akamai's cloud platform. Akamai helps businesses connect the hyperconnected, empowering them to transform and reinvent their business online. We remove the complexities of tech ...
Read more
Promoted Content
The State of Security in State & Local Government
Follow
224
Gone Phishing For The Holidays
While our team, Akamai's Enterprise Threat Protector Security Research Team, monitored internet traffic throughout the 2017 holiday season, we spotted a wide-spread phishing campaign targeting users through an advertising tactic. During the six week timeframe, we tracked thirty different domains with the same prefix: "holidaybonus{.}com". Each one advertised the opportunity to win an expensive technology prize - a free iPhone 8, PlayStation 4, or Samsung Galaxy S8. The websites associated ...
Follow
443
A Death Match of Domain Generation Algorithms
Today's post is all about DGA's (Domain Generation Algorithms): what they are, why they came into existence, what are some use cases where they are used, and, most importantly - how to detect and block them. As we will demonstrate here, the most effective defense against DGAs is a combination of traditional methods with modern machine intelligence. DGA: WHAT AND WHY? The dictionary definition of Domain generation algorithms (DGA) is "algorithms seen in various families of malware that are used ...
Follow
781
Attack of the Killer ROBOT
On Dec 12th, 2017, researchers Hanno Böck, Juraj Somorovsky and Craig Young published a paper detailing an attack they called the Return Of Bleichenbacher's Oracle Threat (ROBOT)(https://eprint.iacr.org/2017/1189). This attack, as the name implies, is an extension of an attack published in 1998 (https://link.springer.com/content/pdf/10.1007%2FBFb0055716.pdf) that affects systems using certain implementations of RSA key exchange. Customers have voiced concerns about this threat and asked how Ak ...
Follow
400
Retailers capitalize on mobile experiences to generate record revenue during Black Friday and Cyber Monday
The results are in, Black Friday and Cyber Monday broke all records in 2017 as the total revenue for these days exceeded $11.5 billion. Anticipating that more consumers would shop online, retailers invested in digital experiences and geared up for the holidays by (i) stocking fewer items in stores to reduce inventory costs and (ii) hiring few seasonal workers. Retailers' predictions were accurate, and their investment in digital experiences paid off, as close to 40% of the Black Friday revenue w ...
Follow
386
Do You Believe in Serendipity?
In December 2016, after a month of mountain bike racing and touring in Nepal, I commenced the Executive Program in General Management at MIT. The first term was at Sloan School of Management in Cambridge and for the first time in my life, I finally could relate to studying. In fact, I was even enjoying it! One of the many practical subjects was "How Companies Become Platform Leaders" by Professor Pierre Azoulay with references to MIT alum companies like Dropbox; and a fascinating case study ...
Follow
903
Layered Security Without the Layered Complexity
With the recent influx of news reports regarding security incidents, more Chief Information Security Officers (CISOs), Chief Information Officers (CIOs), and IT professionals are reviewing current security infrastructures, policies, and practices to identify potential weaknesses in their security posture. This has long been best practice, but with the progressive use of various attack and threat vectors now employed by malicious actors against businesses, this practice must be constantly in ...
Follow
891
Data Breaches and Credential Stuffing: Don’t Get TKOd
By Patrick Sullivan It has been a very rough month for the information security community.  It feels like we've been on the losing end of a championship fight against Floyd Mayweather. The body shots started with Equifax and continued with attacks on the US Government. The assault included a couple of combination shots as Equifax expanded the scope of their breach by adding millions of additional impacted accounts and as reports emerged that this was not the first breach for Equ ...
Follow
502
Cybersecurity Executive Order 13800: More than a Risk Assessment?
Most folks around the Washington DC beltway have heard the cybersecurity Executive Order (EO 13800 - Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure) referred to as a simple risk assessment. But the reality is that it is much more about broadly modernizing federal IT infrastructure and improving the cybersecurity of our federal networks. Sure, the first step is a risk management report, but the next focuses on procurement of shared IT, including cloud and cybe ...
Follow
631
What makes a good “DNS Blacklist”? – Part 2
In "What makes a good 'DNS Blacklist'? - Part 1", we explored the background and factors that have gone into Akamai's thinking behind New security products like Enterprise Threat Protect (ETP). This article continues with a list of factors and questions to ask any DNS Threat Feed providers, including Akamai. What should enterprises look for in the DNS Threat Policies? DNS Threat Policies are more than a DNS Blacklist.  The term "DNS threat policy" refers to a combination of three factors: ...
Follow
1158
What makes a good “DNS Blacklist”? – Part 1
Akamai has just launched the Enterprise Threat Protection (ETP) platform. ETP is built on Akamai's global AnswerX Cloud that now reaches 28 countries and is expanding to new countries every month. As a new player in Cloud DNS resolver services, competitors will ask "why Akamai?" or "what gives Akamai the knowledge and capacity to build effective DNS blacklists?" These are good questions from our competition, and are also questions that our customers should ask. Let's explore why Akamai is in a u ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

How to Master Cyber Security
Views: 69 / February 25, 2018
Intro to HTML
Views: 611 / February 24, 2018
How to Convert EML Files to PST
Views: 423 / February 24, 2018
How to Become a CISO
Views: 699 / February 24, 2018
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel