Accelerating Your Zero Trust Security Transformation with Enterprise Threat Protector

Accelerating Your Zero Trust Security Transformation with Enterprise Threat Protector

|
The basic concepts of zero trust security are relatively simple: trust nothing, verify everything, and maintain consistent controls. But, for CISOs and CIOs charged with transforming their legacy moats and castles architecture to one that allows their enterprises to embrace ... Read More
Screen Shot 2018-08-22 at 1.12.10 PM.png

How’s that Security Back Door Doing? (Part 2)

|
In the first part of this blog post I wrote about how recursive DNS (rDNS) is an attack surface that many enterprises don't currently protect. Bad actors are exploiting that fact and developing advanced targeted threats that use DNS to ... Read More
ARE YOU LEAVING YOUR SECURITY BACKDOOR OPEN?

ARE YOU LEAVING YOUR SECURITY BACKDOOR OPEN?

|
Gartner predicts that enterprises will spend $96 Billion on cyber security this year, up 8% from their spend in 2017. That's a big chunk of change. To put it into context, that spend is in the same ballpark as the ... Read More
Tailoring YouTube for Your Requirements

Tailoring YouTube for Your Requirements

|
Did you know around 300 hours of video content is uploaded to YouTube every minute of every day? That's a staggering amount of content ... Read More
Learn How Trillions of DNS Requests Help Improve Security

Learn How Trillions of DNS Requests Help Improve Security

|
Akamai's global platform is comprised of 240,000 servers in 3,750 locations within 134 countries. Additionally, our platform interacts with 1.3 billion client devices every day and we ingest 2.5 exabytes of data a year. So why are these stats important? ... Read More
Election Readiness 2018

Election Readiness 2018

|
2018 is a pivotal year for the integrity of our electoral process. The threat to the digital infrastructure of our elections is proliferating to a level that has not been seen before. Officials are working tirelessly to protect your vote ... Read More
Your Users Have Left the Building: Now What?

Your Users Have Left the Building: Now What?

The dramatic growth of mobile devices, the widespread availability of always-on fast wireless networks, and the rapid adoption of cloud applications have transformed the viability of remote working. Employers are increasingly adopting flex schedules, implementing work from home options, and ... Read More
The Pitfalls of Guest Wi-Fi

The Pitfalls of Guest Wi-Fi

| | security bloggers network
Do you remember the days before mobile broadband was commonplace and connection speeds on 2G wireless were barely usable? How often did you seek out a specific location such as a coffee shop or a hotel that offered a free ... Read More
The New Cyber Landscape: More Threats, But Fewer Security Professionals

The New Cyber Landscape: More Threats, But Fewer Security Professionals

Great news: If you're a security professional, your skills have never been more in demand. On the flip side, if you're looking for security talent, the search will likely be lengthy and difficult. ISACA predicts that by 2019 there will ... Read More
Algorithms, Alerts, and Akamai Threat Intelligence

Algorithms, Alerts, and Akamai Threat Intelligence

Let me start by posing a question: If in one week security solution A produces 120 alerts and security solution B produces 45 alerts, which solution is providing you with more effective protection? The answer is: It depends. On the ... Read More