An Attack Surface Workout for Web Application and API Attacks

WAF Attacks have been increasing dramatically over the last 9 months. These attacks cut across industries, geos and customers. Growth has largely been driven by Local File Inclusion (lfi) attacks, which took the lead from SQL Injection attacks in early…

Read More >>

What happens to your MIT digital presence after graduation

If you are graduating from MIT this month, congratulations! This also means it’s time to start preparing for life after commencement. “Offboarding” is the process of transitioning and closing out your digital presence at MIT. It is important that you d…

Read More >>

Zero Trust and the Fallacy of Secure Networks

Talking about secure networks is like talking about safe pools. A pool is just a body of water, and if it has enough water to swim in, then it has more than enough water to drown in. A pool is inherently unsafe. We, therefore, take care in how we use a…

Read More >>

Platform Update: Build the Future on Akamai

Today, technology is infused into nearly everything we do. The data behind personalized recommendations, connected devices, and wearables has changed how we engage with the world around us ? whether we?re driving to a new destination, purchasing from a…

Read More >>

Recycling IT equipment at MIT

Spring is a great time to recycle your department, lab, or center’s (DLC) obsolete or surplus IT equipment. Old, damaged, or unwanted computers and peripherals can be safely recycled to free up office space in a responsible way. Read on to find out wha…

Read More >>

Reaching the Convergence of Security and Productivity

It?s all too common that IT security tools and practices come at the cost of productivity. Even physical security has this trade-off. There would be no rush to arrive at the airport an hour early if it weren?t for the extensive security measures that f…

Read More >>