Unfortunately, today’s sophisticated web application threats have gained some advantages over typical WAFs: Favorable odds — WAFs must correctly identify attacks 100% of the time, whereas attackers have the luxury of only needing to find a single bypa…
Online Safety Tips to keep 3rd and 4th Grade kids safe while Online Schooling and Surfing
The coronavirus pandemic has forced children to spend a large part of their working day on the computer and online. Our young kids are embracing the Internet at an accelerated pace. Today’s essentials like online schooling and virtual…
There is a 100% chance that you will click on a Phishing Email!
Astounding isn’t it! I am sure that you will question the audacity of the statistic. I can tell you with confidence that even a security expert is not immune to falling prey to phishing emails. That is why even the most mature security companies …
NATO’s secure online-meeting tools have some in the European Union jealous
Sharing is caring, argues Germany’s defense minister.
Smart DNS: Delivering the Best Subscriber Experience
The presence of public “over-the-top” DNS resolution alternatives is a strong motivator for internet service providers (ISPs) to invest in making their DNS resolution infrastructure the best that it can be. Resolvers are the glue that binds subscribers…
Cyberweek 2020 Attracted Both Online Shoppers and DDoS Attackers
2020 has shown both record-busting bps and pps attacks and the most prolific DDoS extortion campaign recorded by Akamai.
Evading Link Scanning Security Services with Passive Fingerprinting
By Gal Bitensky, Executive Summary Link scanners are a critical component in multiple classes of security products including email security suites, websites that suggest direct inspection of a suspicious link, and others. Behind the scenes, these servi…
Can Edge Computing Exist Without the Edge? Part 2: Edge Computing
In part 1 of this series, I drew the architectural distinction between a centralized cloud platform and a distributed edge network. This is an important foundation upon which to explain the difference between cloud computing and edge computing. The two…
Phishing Summary 2020?Trends and Highlights
2020 was a challenging year for many of us, as the COVID-19 pandemic disrupted life and introduced challenges in almost all elements of living. 2020 was also challenging from a cybersecurity point of view, as nearly the entire workforce moved…
Distinguishing Among DNS Services Part 2: The Economics
This is Part 2 of a 3-part blog series highlighting some of the distinguishing aspects of Akamai’s DNS services, Edge DNS and Global Traffic Management.