While examining my honeypot logs and digging through the newly downloaded binaries last week, I noticed a large compressed file. I figured it would be a crypto miner, typically a tar archive and gzip (normally erroneously) compressed. I moved the archi…
Why FIDO2 is the Answer to Better Security
A groundbreaking increase in security incidents is affecting governments around the world. In light of this, the United States issued a formal order to implement a robust set of security measures designed to improve the security of federal systems. In …
Why FIDO2 Is the Answer to Better Security
A groundbreaking increase in security incidents is affecting governments around the world. In light of this, the United States issued a formal order to implement a robust set of security measures designed to improve the security of federal systems.
Digital Transformation Usain Bolt-Style: Health Care’s Sprint to Modernization
In the present age, patients now use smartphone apps to schedule doctor’s visits, contact insurance companies, and get prescriptions instead of picking up the phone.
How Does Ransomware Actually Spread?
We all know the damage ransomware can do – but how does ransomware actually spread? Our blog shows you how – and how it can be stopped.
Cyber Security: Data ‘Re’-Assurance
How do you know company data is secure? How do organisations know their data is secure? And how can companies ensure that a network breach won’t result in a loss of sensitive data? The consequences of a data breach are potentially disastrous for a…
XITE Music Video Platform Amplifies Entertainment with Akamai’s Help
With so many people around the globe seeking socially distanced fun and solace, at-home entertainment has never been more important. XITE aims to offer the best music video experience in the world. Akamai is delighted that this exciting, interactive vi…
Discussing the Philippine Coast Guard’s Coastal Radar Stations (Phase 1) Projects
The Philippine Coast Guard is a growing organization in terms of manpower, assets and capabilities. And with its growing responsibility and challenges to support in maritime safety and law enforcement, it needs new capabilities.Among those identified t…
A/B Testing, Now with EdgeKV
Now that we’ve written the framework of our code, let’s layer in EdgeKV (EKV), our distributed key-value store database.
How to Ensure Security when Buying a Refurbished or Second-Hand Smartphone
Last year, a Which? investigation found that 31% of resold smartphone models from three of the major used and refurbished handset stores are no longer receiving security updates. Phone manufacturers only schedule data updates for a certain period after…