Connected Devices
Finite State Adds Binary Analysis to Catch Zero-Days
Michael Vizard | | application binaries, Application Security, Connected Devices, edge, Finite State, Log4j Vulnerability, supply chain security
Finite State this week has added a binary analysis capability that enables device manufacturers to more easily identify zero-day vulnerabilities in software. Jeff Martin, vice president of product for Finite State, said ...
Security Boulevard
Akamai + Fingerbank: How an open source community can transform security
Charlie Gero | | Cloud Security, Connected Devices, connecteddevices, Corporate, enterpriseapplicationaccess, iot, News & Announcements, zero trust, zerotrust
Isn't it amazing how seemingly simple decisions can have far-reaching effects? When the Inverse team in Montreal took over PacketFence in 2008, it was an open source (OS) solution. They recognized the ...
Cyberattacks Evolve as the Hospitality and Travel Industry Adapts
Ashitha Bhanu | | Cloud Security, Commerce, Connected Devices, covid19, Enterprise Threat Protector, hospitalityandtravel, identity management, securityawareness, zero trust
While the world fights against the COVID-19 pandemic, cybercriminals are out in full force with a multitude of scams designed to take advantage of the confusion and panic. COVID-19 has -- by ...
Healthcare: Elite Data
Karen Bender | | #BeCyberSmart, Connected Devices, Cybersecurity, General, healthcare, healthdata, ncsam, Protect Yourself, SE, SocialEngineering
The healthcare industry is overwhelmingly reliant on internet-connected devices as solutions. There’s no doubt some of those devices advance patient care and even critical response. Healthcare possesses elite data making ...
Balancing Protection with Performance to Double Down on DDoS
Susan McReynolds | | cloud computing, Cloud Security, Connected Devices, ddos, edge computing, extortion, Financial Services, healthcare, Hybrid WAN, hybridcloud, Online Gaming, Public Sector, Retail & Commerce, Standards and Protocols
Combating DDoS attacks with the highest quality of mitigation means having the right platform, processes, and people in place. At Akamai, we're recognized as a leader for DDoS mitigation solutions based on ...
Akamai’s Polymorphic AI Framework Preemptively Manages Bots
Christine Ross | | AI, botmanagement, CDN, cloud computing, Cloud Security, Connected Devices, credentialstuffing, edge computing, Partners
Too many security efforts react to threats as they come. While security teams often succeed through Herculean efforts, being constantly under siege takes its toll on your resources. The relentless barrage of ...
Making the Edge Come Alive
Shane Keats | | CDN, cloud computing, Connected Devices, Media Delivery, ott, Professional Services, Standards and Protocols, streaming
In April 2019, Netflix viewers streamed 164 million hours of on-demand content per day. Fast forward a year. In April 2020, Twitch streamed 55 million hours per day. The vast majority of ...
You Are Here: Giving Your Users the Local Experience They Deserve
David Theobald | | CDN, cloud computing, Connected Devices, developerexperience, edge computing, edgecomputing, edgeworkers, serverless, Web Performance
Locality matters for most things in life: weather, health care, shopping, product reviews, dinner reservations, social networking, data privacy, news, sports ... the list goes on and on in our ever more ...
Serverless at the Edge: Enabling Magical Unicorns
David Theobald | | CDN, cloud computing, Connected Devices, developerexperience, edge computing, edgecomputing, edgeworkers, serverless, Web Performance
Before we dive straight into the magical unicorn from heaven that is serverless computing embedded within the CDN edge (a direct customer quote that I want on a team T-shirt soon), let's ...
20 Years of Edge Computing
How long will you wait for something? That depends on what you're waiting for, of course. But in your daily interactions, think about how many "things" you interact with where you expect ...