The presence of public “over-the-top” DNS resolution alternatives is a strong motivator for internet service providers (ISPs) to invest in making their DNS resolution infrastructure the best that it can be. Resolvers are the glue that binds subscribers…
Cyberweek 2020 Attracted Both Online Shoppers and DDoS Attackers
2020 has shown both record-busting bps and pps attacks and the most prolific DDoS extortion campaign recorded by Akamai.
Evading Link Scanning Security Services with Passive Fingerprinting
By Gal Bitensky, Executive Summary Link scanners are a critical component in multiple classes of security products including email security suites, websites that suggest direct inspection of a suspicious link, and others. Behind the scenes, these servi…
Can Edge Computing Exist Without the Edge? Part 2: Edge Computing
In part 1 of this series, I drew the architectural distinction between a centralized cloud platform and a distributed edge network. This is an important foundation upon which to explain the difference between cloud computing and edge computing. The two…
Phishing Summary 2020?Trends and Highlights
2020 was a challenging year for many of us, as the COVID-19 pandemic disrupted life and introduced challenges in almost all elements of living. 2020 was also challenging from a cybersecurity point of view, as nearly the entire workforce moved…
Distinguishing Among DNS Services Part 2: The Economics
This is Part 2 of a 3-part blog series highlighting some of the distinguishing aspects of Akamai’s DNS services, Edge DNS and Global Traffic Management.
Distinguishing Among DNS Services Part 2: The Economics
This is Part 2 of a three-part blog series highlighting some of the distinguishing aspects of Akamai’s Domain Name System (DNS) services, Edge DNS and Global Traffic Management.
Distinguishing Among DNS Services Part 1: The Platform
This is Part 1 of a 3-part blog series highlighting some of the distinguishing aspects of Akamai’s DNS services, Edge DNS and Global Traffic Management.
Modernization of Identity and Access Management
From the Oracle IAM blog:”Oracle has been in the IAM business for more than 20 years and we’ve seen it all. We’ve addressed numerous IAM use-cases across the world’s largest, most complex organizations for their most critical systems and applications. …
Using LL-HLS with Byte-Range Addressing to Achieve Interoperability in Low Latency Streaming
HTTP Adaptive Segmented (HAS) streaming began to be used at scale from 2008 to 2012, with the advent of Move Networks, Microsoft Smooth Streaming, Apple HLS, Adobe HDS, and MPEG DASH. With the typical 10s segment durations of the day, livestream latenc…