Defensive Security Podcast Episode 241

https://www.bleepingcomputer.com/news/security/allied-universal-breached-by-maze-ransomware-stolen-data-leaked/
https://www.csoonline.com/article/3454443/how-a-bank-got-hacked-a-study-in-how-not-to-secure-your-networks.html

Read More >>

Akamai Foundation and Social Responsibility

Recently, at Akamai, we launched the Akamai Foundation, to continue to reach a broader, more diverse range of young people with quality Science, Technology, Engineering and Math (STEM) education. We believe that this work is a vital part of securing…

Read More >>

5.0 Released!

We’ve officially released version 5.0 of the WiKID Strong Authentication Server.  There are numerous improvements in this release, most under the hood.  Speed is dramatically increased.  We have setup a separate logging system so that logs no longer go…

Read More >>

Defensive Security Podcast Episode 240

https://arstechnica.com/information-technology/2019/11/breach-affecting-1-million-was-caught-only-after-hacker-maxed-out-targets-storage/
https://www.csoonline.com/article/3452747/what-you-need-to-know-about-the-new-owasp-api-security-top-10-list.html

Read More >>

In Conversation: Successful Women

Success is a tricky word to define. It means something different to everyone and can only be measured by an individual themselves. Often, success is seen as being about what an individual achieves, rather than about who they grow to…

Read More >>

XRay – Using For Recon Mapping And OSINT Suite

XRay is a software for recon, mapping and OSINT gathering from public networks.

XRay for network OSINT gathering, its goal is to make some of the initial tasks of information gathering and network mapping automatic.

How Does it Work?
XRay is a ve…

Read More >>

Phishing Detection via Analytic Networks

As mentioned in previous Akamai blogs, phishing is an ecosystem of mostly framework developers and buyers who purchase kits to harvest credentials and other sensitive information. Like many framework developers, those focusing on phishing kits want to …

Read More >>