In The News

The latest articles, blog posts and newscasts mentioning Akamai

  • “You Get What You Celebrate”: Net@50 Gives the Internet Its Due
    Xconomy
    July 26, 2019

    Net@50 last week explored the internet’s past, present, and future with thoughts from rare group of engineers who imagined and built the internet’s precursor; executives grappling with the challenges and opportunities baked into today’s internet; and thinkers predicting what the next half century of connected computers could bring.

    Akamai CEO Tom Leighton spoke about the increasing importance of the internet’s edge, which includes devices like phones and computers as well as the “last mile” of connectivity. The stakes for security on the edge have never been higher, he said.

    “It’s a very serious challenge today,” he said, adding that Akamai’s technology attempts to “absorb attacks at the edge before they get to the core of the internet.”

    Read Full Story
  • The video game industry is a black hole for cybersecurity
    VentureBeat
    July 24, 2019

    New data from Akamai, an internet delivery and cloud services company, has exposed that the video game industry remains a growing threat vector for security breaches. Hackers have targeted 12 billion credential stuffing attacks against game websites within a 17-month period. Emuparadise, the retro gaming site, is the latest gaming community to admit having suffered a credential stuffing attack.

    Industries that have significant financial risk, like banking or ecommerce, store passwords in robust hashing algorithms that make them difficult to crack. This deters cybercriminals who look for the easiest and fastest way to breach systems: credential stuffing attacks. Those are attacks where other sites with passwords have been hacked, and those names and passwords can then be attempted.

    Read Full Story
  • “Why the Phishing Problem is Getting Worse”
    TechBeacon
    July 12, 2019

    Phishing has been around as long as email, and it continues to present a substantial risk to business and is often cited as a top security concern. The concern is driven by increasingly sophisticated attacks; the move from email to alternative attack vectors, such as social media and messaging; and the simple fact that phishing targets the weakest link in the security chain: people.

    The 2019 Verizon Data Breach Incident Report (DIBR) established a correlation between phishing and stolen user credentials in the vast majority of reported data breaches. Why should attackers bother looking for ways to bypass your business’s security controls when they can simply walk in the front door with user credentials harvested from a phishing attack?

    Fortunately, there are a few things you can do can you protect your organization.

    Byline article by Akamai Senior Product Marketing Manager Jim Black.

    Read Full Story
  • SMASH and Akamai Technologies Partner with Northeastern to Immerse Diverse High School Students in STEM
    Khoury College of Computer Sciences
    July 15, 2019

    SMASH Academy is a rigorous, three-year residential college prep program, located at leading universities, that helps students deepen their talents and prepare for STEM degrees and careers. Beginning in 2020, Northeastern will offer Boston high school students the opportunity to participate in this interdisciplinary tech program with a focus in computer science.

    Every summer, Boston SMASH Northeastern scholars will be immersed in tuition-free studies at Northeastern’s Boston campus. During the academic year, scholars will participate in monthly events. The program will be made possible in part through a generous gift from the Akamai Foundation, the philanthropic arm of cloud services and security network company, Akamai Technologies.

    Anthony Williams, president of the Akamai Foundation, credits Khoury College’s leadership in the arena of tech diversity as integral to its decision to join with SMASH. He says, “Dean Brodley is focused on driving diversity within the computer science field – we share a mutual interest in broadening the technology ecosystem.”

    Read Full Story
  • How improved infrastructure & tech firms are changing game development in India
    Economic Times
    July 19, 2019

    Today, multiplayer games such as PUBG and Fortnite have taken over that space, aided by improved Internet infrastructure and low-cost smartphones that offer significantly greater processing power.

    This is changing game development, as it is no longer enough to just build and ship single-user games.

    “In India, since gaming is clearly mobile-first, we see that the gaming industry continues to develop from a mobile context. This means, games have to be short-form and have to allow for easy play regardless of the network environment,” said Nelson Rodriguez, Global Director, Media Industry Strategy, Akamai, a Nasdaq-listed cloud delivery network provider.

    Akamai is currently working on reducing latency and stabilizing the network performance of games for a better multiplayer experience, he said.

    Read Full Story
  • Tackling the Issue of Online Gaming Credential Stuffing
    Security Boulevard
    July 9, 2019

    When it comes to cyberattacks, what causes them and the risks they pose, our attention focuses primarily on the most vital industry verticals: financial, health care, commerce and government. So when I sat in on a session about Akamai’s recently released “State of the Internet/Security report” at the company’s recent Edge World conference, I thought for sure that I’d be hearing about the security and threats in those industries. Instead, the session (and the report) was all about web attacks and cyberthreats against the gaming community.

    That’s right. The online gaming community—those who play Dota and Fortnite and hundreds of other interactive video games—are regularly being targeted by cybercriminals. That in itself is important, especially when you consider the number of young people involved in gaming. But what’s happening here can provide valuable lessons on the types of threats we face now and, more importantly, what could happen in larger, more critical industries as the move to digital continues.

    Read Full Story
  • IoT brings hotel guests closer to home away from home
    IoT Agenda
    July 3, 2019

    In today’s ultra-connected world, going to an average hotel with free Wi-Fi and USB charging stations is considered par for the course. Consumers expect their guest experience to be as personalized as their home. From check in to check out, it’s up to today’s hospitality leaders to ensure not only a pleasant experience, but one where guests leave feeling like they never left home at all.

    IoT is changing the game when it comes to upgrading basic hotel features. In fact, many major hotel chains throughout the world are adopting IoT technology to deliver smart, hyper-personalized hotel rooms, otherwise known as connected rooms.

    Byline article by Akamai Senior Web Performance Architecture Brain Apley.

    Read Full Story
  • 5G Isn’t Here Yet: How to Leverage 4G to Create Optimal CX
    Total Retail
    July 3, 2019

    Today’s headlines are bursting with promises of 5G — and now, even 6G is becoming part of the conversation. But the fact is, globally, 4G is still the name of the game and will be for quite some time, with 72 percent of networks expected to run on the fourth-generation cellular network technology through 2022.

    With that, retail brands need to be thinking critically about how they can leverage the technologies and data they have today to offer optimal mobile shopping experiences to customers across a wide breadth of connection speeds, especially when you consider that mobile is outpacing desktop for the first time when it comes to online orders.

    Here are some trends and strategies brands should keep in mind when it comes to optimizing mobile at the edge for a 4G reality, with a focus on convenience, user experience (UX) and security.

    Byline article by Akamai Director Industry Marketing Chris Wraight.

    Read Full Story
  • Building The Future Through Security Internships
    Dark Reading
    July 1, 2019

    The search for stellar cybersecurity job candidates is always an adventure — but much less so since we opened the doors at Akamai University, our 12-week summer student internship program.

    We're looking for candidates who can demonstrate several different skills, proficiencies, and talents both on and off their resume. In addition, we look for traits that lead to long term success in the department and industry in general. For example, one important trait is a sense of urgency: people who know when to take action when action is the most important thing to take. This skill counteracts the "impostor syndrome" that plagues our industry. By that I mean the situation that arises when you need someone to do something, and that someone is the only choice, and thus becomes the best choice.

    The next trait we seek in a candidate is demonstrated ability and understanding of responsibility and independence. In the security industry, job duties often require sending relatively junior staff in to fix problems involving people many years their senior. We need staff who can take responsibility and act on their own under those circumstances.

    Byline article by Akamai Director of Adversarial Resilience Kathryn Kun.

    Read Full Story
  • Akamai wants to win more cybersecurity contracts in Korea
    The Korea Times
    July 3, 2019

    Akamai Technologies, a U.S.-based content delivery and cloud service provider, is trying to secure more Korean companies in the cybersecurity sector, strengthening sales and marketing efforts here, the company said Wednesday.

    Established in 1998, Akamai is known for providing content delivery network (CDN) services, which involves distributing and relaying connections between data centers and end users to facilitate data transmission and avoid network congestion.

    The U.S. tech company has expanded its business portfolio into the cybersecurity segment, releasing cybersecurity measures for enterprise customers. To promote its cybersecurity service, it held an Akamai Security Summit in Seoul.

    Read Full Story
  • Finding Beauty in the IT Architecture
    ThreatPost
    July 1, 2019

    A good appreciation and respect for good real-world architecture goes a long way when it comes to architecting resilient systems.

    I have a confession to make. I’m a sucker for good architecture. Visiting places like Singapore, London, Rome, Buenos Aires, and New York City, I quickly find myself gravitating towards beautiful archways, spires, and even the voids used in designing some of the world’s most amazing buildings. I also found myself with a similar sense of awe when working as a network, telecom, and security engineer over the past 20 years.

    To design resilient systems, there must be a careful balance between redundancy and capacity, and a real thoughtful structure as to what systems you control and what systems you need to account for – which are ultimately out of your control. By that I mean, on one side of the equation you have your own routers, load balancers, CPE (customer premise equipment), and the ISP circuits with associated “guarantees” to account for.

    Byline article by Akamai Senior Security Technology and Strategy Manager Tony Lauro.

    Read Full Story
  • 'Silex' Malware Renders Internet-of-Things Devices Useless. Here's How to Prevent It
    Fortune
    June 26, 2019

    A new malware known as Silex is bringing smart devices to their knees.

    The Silex malware, according to ZDNet, ruins smart devices by gaining access to and destroying a device’s storage, eliminating its firewall and removing its network configuration. From here, the device stops working.

    Silex was reportedly created by a 14-year-old hacker who goes by the pseudonym Light Leafon, according to ZDNet. The malware went unknown until it was spotted by Larry Cashdollar, a security exploit researcher, on Tuesday. “It’s using known default credentials for IoT devices to log in and kill the system,” Cashdollar told ZDNet, which reports that Silex first affected 350 devices and then quickly spread to over 1,500 more.

    Read Full Story
  • Continuing Hallmark’s Holiday Season Celebrations Throughout The Year
    TV Technology
    June 21, 2019

    With the streaming market growing and consumers shifting toward multiplatform video experiences, Crown Media seized the opportunity to launch two additional linear networks—Hallmark Movies & Mysteries and Hallmark Drama—along with both video on demand (VOD) and subscription video on demand (SVOD) platforms for all three of its networks.

    Crown Media recognized it needed more sophisticated and streamlined workflows, media players and reporting to help track and understand its new platform network.

    Crown Media enlisted the help of Akamai, which it was already using for content delivery network (CDN) services. In implementing Akamai’s Adaptive Media Player (AMP) and adaptive bitrate playback capabilities, Crown Media was able to reduce the vendor complexity and minimize integrations, ultimately, simplifying a monster task within its streaming workflows.

    Read Full Story
  • Implementing Zero Trust, One App at a Time
    Security Boulevard
    June 24, 2019

    During a session I attended at Akamai Edge World 2019 in Las Vegas earlier this month, the panel moderator asked a group of CISOs a simple question: Is zero trust the real deal or the latest buzzphrase in cybersecurity?

    After that session, I had the opportunity to bring that up with two of Akamai’s zero trust experts: Lorenz Jakober, director of Product Marketing, and Patrick Sullivan, global director of Security. Sullivan was the moderator who asked that question to his panel, but apparently, it is one the Akamai team asks its customers frequently. They get a lot of eye rolls from those who think it is nothing more than the latest buzz term, said Jakober.

    “Once that initial conversation has happened and you begin to discuss the underlying principles and architecture, there is usually agreement that there is value in the framework,” Jakober continued, “as long as it’s aligned to the overall approach to zero trust, versus a zero-trust product or solution.”

    Read Full Story
  • Cutting Edge way local security company tracks cyber attacks
    WCVB
    June 21, 2019

    On one day alone, Akamai tracked more than 98 million attacks or hacking attempts from around the world, among the trillions of individual internet transactions.

    Read Full Story
  • Inside the FBI's Fight Against Cybercrime
    Dark Reading
    June 20, 2019

    Elliott Peterson struggles a bit when asked to identify the most frustrating part of his job as an FBI agent fighting cybercrime.

    Peterson's own team was responsible for investigating and bringing to justice the three-person operation behind the massive Mirai distributed denial-of-service (DDoS) attacks in 2016 that impacted Internet service provider Dyn and several others. More recently, Peterson led a major investigation that in December resulted in some 15 Web domains associated with DDoS-for-hire services being seized and the operators of several being arrested. The actions resulted in a sharp — but temporary — drop-off in DDoS activity early this year.

    “We see them talk about this stuff on forums and Discord chats,” Peterson said in an interview with Dark Reading at Akamai’s Edge World user conference in Las Vegas last week. “We've had a lot of wins in the areas we focus on.”

    Read Full Story
  • 4 ways IoT innovation can transform the utilities industry
    IoT Agenda - TechTarget
    June 14, 2019

    IoT innovation is turning the utilities world on its head, augmenting smart meters with more advanced monitoring, alerting and data analytics capabilities than ever before. One of the most impactful innovations is a publisher-subscriber messaging protocol called MQTT. In the case of the utilities industry, electrical grids, gas pipelines and water suppliers can use MQTT to more quickly and accurately transmit data between their services and their customers and devices.

    This article will provide four use cases that can transform the way utilities, especially electricity providers, can improve performance by cutting costs, improving billing and responding faster and more efficiently to service disruptions.

    Byline article by Akamai Senior Product Architect Mark Ingerman.

    Read Full Story
  • Akamai Technologies join hands with DreamHack for cybersecurity
    CISO Magazine
    June 18, 2019

    Digital entertainment company DreamHack recently announced a new partnership with the cloud delivery network provider Akamai Technologies to jointly share data security insights along with analysis on the global gaming and eSports industry. Based in Sweden, DreamHack is a production company specialized in eSports tournaments and other gaming conventions.

    As the popular cloud delivery platform, Akamai provides its customers with the best and most secure digital experiences on any device, anytime, and anywhere. Akamai intends to serve a larger base of carrier and enterprise customers with more comprehensive security products. These products will be designed to more effectively identify, block, and mitigate cybersecurity threats such as malware, ransomware, phishing, and data exfiltration.

    Read Full Story
  • Pokémon Go creator sues hackers who help players to cheat
    CISO Magazine
    June 20, 2019

    Niantic, the creator of Pokémon Go, Ingress, and the upcoming Harry Potter: Wizards Unite games, stated the hacker group named Global++ is behind the hacked versions of Pokémon Go and Ingress which are dubbed as PokeGo++ and Ingress++. Niantic also stated that the group has earned money by selling subscriptions to the hacked game applications.

    A recent research revealed that the gaming industry has become an attractive target for cybercriminals with 12 billion credential stuffing attacks reported in the past 17 months (November 2017-March 2019). According to the Cloud delivery network provider Akamai Technologies, the gaming community is among the most lucrative targets for hackers to make a quick profit.

    In its research report, “2019 State of the Internet/Security Web Attacks and Gaming Abuse” Akamai stated that there were 55 billion cases of credential stuffing attacks across all industries. The report highlighted that nearly 67% of credential stuffing attacks target organizations based in the United States. It stated that Russia is the second largest source of application attacks and China is ranked as the fourth highest source country.

    Read Full Story
  • Akamai targets IoT devices with launch of IoT Edge Connect
    ZDNet
    June 12, 2019

    Akamai launched IoT Edge Connect, a service that's aimed at connecting Internet of things end points and applications.

    Simply put, Akamai's network, which puts content and media closer to customers to reduce latency, can be used for IoT data.

    Edge Connect is part of Akamai's Edge Cloud, which is designed to enable enterprises to deliver data and applications at scale. Networking tools such as 5G are expected to enable more IoT data with less latency.

    Read Full Story
  • Akamai on dragging 'em kicking and streaming to the edge: They might be public cloud giants, but we're, er, vids in
    The Register
    June 13, 2019

    Akamai Edge World The future of enterprise IT is not in centralised clouds, but in a complex interplay between massive core data centres and small edge locations. So said Akamai cofounder and CEO Tom Leighton as he kicked off his company's annual shindig in Las Vegas.

    “They say that the best place to put your infrastructure is in data centres at the core of the internet. Now, if you think about it, that doesn't make a lot of sense,” he said.

    “The core data centres are further from the end users, and so the latency is worse. Core data centres are focal points for traffic, which can lead to congestion. They are rich targets for attackers. And as you can often read in the headlines, data centres have a tendency to go down, which can disrupt your business.”

    Read Full Story
  • Shaquille O’Neal – Geek, and Proud Of It – Offers Inspiration to Akamai Crowd
    M&E Daily
    June 14, 2019

    Shaquille O’Neal — NBA hall of famer, multi-million investor, commercial sponsor mainstay and self-described tech geek — was asked June 13 during his closing keynote at Akamai’s Edge World 2019 how he wants to be remembered. His response drew an audible “awwww” from the crowd.

    “I want people to say ‘Shaq is a nice guy,’” the 47-year-old father of six said. “Every day I try to do 4-5 things that make people smile.”

    Humble, hilarious and touching, O’Neal’s presentation put a seemingly perfect bow on top of the annual tech event, with him sharing a lot more about his investment ideas over reliving his basketball career.

    “When I was young, I was a mercenary [investor], I wanted the big hit,” but as he got older, O’Neal looked to be a “missionary” with his investments instead. “Is this going to change the world?” is a question he asks now before getting involved in companies.

    Read Full Story
  • Akamai: Hackers have carried out 12 billion attacks against gaming sites in 17 months
    VentureBeat
    June 12, 2019

    OTT video is still in its early days, but it's on a clear trajectory to triumph over broadcast. That was one of the many video-related takeaways from Akamai CEO Dr. Tom Leighton during his keynote at Akamai Edge World in Las Vegas this week.

    “I was recently told by one of the world's largest broadcasters that they are planning to stop using satellites altogether within 10 or 15 years,” Leighton said. “Broadcasters are wondering if the internet can scale, and if they can afford to stream. They worry about cost and capacity challenges when streaming, especially for live events and linear programming. They didn't need to worry about that with broadcast. With OTT, the more successful you are, the more you have to worry about these things.”

    How much traffic is video going to create? “2.5 billion people have watched at least one video on the internet," Leighton said. "In the future, let's say 2.5 billion are watching concurrently at 10Mbps. That's 25,000Tbps.”

    Read Full Story
  • Crime doesn't pay? Crime doesn't do secure coding, either: Akamai bug-hunters find hijack hole in bank phishing kit
    The Register
    June 5, 2019

    Phishing kits – used by miscreants to build webpages that steal victims' personal information and money by masquerading as legit websites – harbor vulnerabilities that can be exploited by other miscreants to pilfer freshly stolen data.

    And while it's not unknown for software developed by criminals for criminals to be buggy and exploitable, proof of such bungling comes this week from researchers at Akamai who have been studying crimeware for vulnerabilities. They've found holes in installations of phishing kits that allow other hackers to sneak in and commandeer operations.

    Akamai senior security researcher Larry Cashdollar, with the help of colleague and researcher Steve Ragan, have found a bunch of phishing kits – particularly those that invite victims to upload files – with classic security vulnerabilities that can be exploited by hackers to take over the installation. That means sites belonging to small businesses, government departments, and so on, that have been compromised to host these phishing pages can wind up being hacked a second time by opportunist thieves seeking to swipe victims' information for themselves once all the luring emails have been sent out.

    Read Full Story
  • Rebuffering, Reliability Seen As Critical To OTT Video
    MediaPost
    June 4, 2019

    In the current state of streaming video, the old adage is “content is king.” While content may still be king, the product—and the technology underpinning that product—is the castle.

    New research from Akamai, the cloud service provider and content delivery network, underscores the value of the technology powering new streaming video services. Akamai modeled potential advertising revenue loss for a “leading U.S. network” that counted 370 million video plays between June 2017 and June 2018. Akamai’s data found a 1% abandonment rate in each instance of rebuffering. With the average play on that network being eight minutes long, the network would have lost nearly 500,000 hours of viewership, totaling 10.7 million ad impressions. The lost revenue from that one case of rebuffering? $85,000.

    Read Full Story
  • What Cyber Skills Shortage?
    Dark Reading
    June 4, 2019

    It feels like every day, there's another article citing the "cybersecurity skills shortage" as an obstacle to filling needed security jobs for the next decade. I disagree. There isn't a significant skills gap. There is a market mismatch. Most employers aren't looking at the people who are actually available; they toss up their hands, credit the skills shortage, and move on. But what's really going on?

    First off, the idea of cybersecurity skills is a pretty one-dimensional view of the landscape of what the modern worker needs to bring to the table. Sometimes, it evokes the image of a black-hoodied hacker who can break applications; or maybe the security operations center (SOC) analyst watching alerts from the application security tool that monitors that application.

    Even these two workers have skills that aren't really parallel. A hacker could be seen as just a quality assurance engineer, testing the negative space of an application (what it shouldn't do), while the SOC analyst is an operator/incident manager, looking for anomalous operations and following time-tested investigative steps to understand what's happening. So, how did we get to a belief in an insurmountable skills gap?

    Byline article by Akamai CSO Andy Ellis.

    Read Full Story
  • Akamai: Digital Security and Efficiency
    NECN (Video)
    May 31, 2019

    Andy Ellis, the Chief Security Officer of Akamai, talks about the company's pivot into cybersecurity. Plus, making the internet fast and efficient. We talk about elections and, yes, even the Bruins in the context of what this company does.

    Read Full Story
  • How Akamai implemented a zero-trust model
    CSO
    May 2, 2019

    A nation state-sponsored cyberattack on Akamai in 2010 triggered an initiative at the company that nine years later has resulted in an application access model very different from that employed by a majority of large organizations. At its core is a design that separates application access from network access. In the past, access to Akamai's network, like at many organizations, pretty much provided a user with access to almost everything on it. These days there’s no network at all, at least in the conventional sense.

    Andy Ellis, Akamai's CSO and one of the architects of the design describes the zero-trust access model as operating very differently from the usual approach of automatically trusting users on the corporate network or those coming in via VPN. “We no longer give someone access privilege because of location,” he says. Where you are has no impact on how you gain access to an application or service. For application access purposes, a user located in an Akamai facility is treated the same way as someone attempting to access an application or service from a remote location.

    Read Full Story
  • Akamai Bets on ‘Zero Trust’ Approach to Security
    CIO JOURNAL
    May 1, 2019

    Akamai Technologies Inc. aims to expand its security business, in part by convincing companies that building walls around information-technology systems will no longer keep hackers, bots and malware out.

    Instead, the Cambridge, Mass., company hopes to sell chief information officers and other corporate IT managers on the idea of narrowing their cybersecurity efforts to the level of individual enterprise applications—a strategy known as “zero trust.”

    “It’s a scary mindset change,” said Tom Leighton, Akamai’s chief executive. By guarding access to each business app within an IT network, rather than the entire network, “there is no inside” for attackers to get into, Mr. Leighton said.

    Akamai launched its first fully zero trust applications this year, he said.

    Read Full Story
  • Akamai CEO Tom Leighton: A quarter of our revenue is security
    CNBC
    May 1, 2019

    [Video] Tom Leighton, Akamai cofounder and CEO, joins “Squawk Alley” in a first on CNBC interview to discuss the company's earnings.

    Read Full Story
  • Ramblings of a Recovering Academic on the So-Called Lack of Security Talent
    Dark Reading
    April 25, 2019

    Recent reports by ISACA and Tripwire suggest that companies are having difficulty filling security jobs. Their studies stress that hiring for senior technical security roles is a particular pain point, with Frank Downs, director of ISACA's Cybersecurity Practices, stating, "Academic organizations don't necessarily teach all aspects of security that make an individual technically proficient."

    While I dare not speak for the entire security industry, I'd like to offer a different perspective by taking a closer look at a specific demographic: graduate students pursuing advanced security research degrees (a PhD or equivalent).

    Byline article by Akamai security researcher and engineer Kaan Onarlioglu.

    Read Full Story
  • Data Economy Frontline. How Close You Need To Be To Edge Data?
    Data Economy
    April 21, 2019

    [Video] With revenues of more than $2.5bn, Akamai is one of largests internet computing distribution platforms responsible for serving up to 30% of web traffic. Joining Data Economy’s João Marques Lima on set this time, is James Kretchmar, VP and CTO at Akamai Technologies, to talk CDN providers strategy at edge, barriers to overcome at the edge and just how close you need to be to the data and how and who chooses where to deploy.

    Read Full Story
  • How Credit Unions Can Optimize & Secure the Mobile App Experience
    Credit Union Times
    April 19, 2019

    A small army of digital natives are about to become the largest generation globally. Gen Z, those born after 1996, will account for 32% of the world’s population (7.7 billion) in 2019 and outnumber millennials for the first time, according to World Economic Forum. This year, it will be critical for businesses across all industries to modernize operations and enhance their digital performance in order to meet the needs of this mobile-first demographic.

    Banks and credit unions in particular have much to gain by adopting next-generation technologies to meet the needs and expectations of their growing tech-savvy customer and member bases – and more to lose if they don’t. The rise of fintech, digital wallets, e-transfer apps and social banking platforms increasingly threaten traditional financial institutions by offering younger generations the financial solutions they need via the digital tools with which they are already familiar. This year, it is imperative that credit unions digitize their services – starting with mobile apps – in order to stay relevant and competitive in 2019 and beyond.

    Byline article by Akamai Senior Product Line Director Gareth Ouellette.

    Read Full Story
  • Real problem’s cybersecurity, not local data: Tom Leighton Cofounder, Akamai Technologies
    The Economic Times
    April 18, 2019

    Too many laws around data may end up balkanising the internet, says Tom Leighton, cofounder of Akamai Technologies, the world’s biggest content delivery network. The academic turned-entrepreneur says that laws alone won’t solve issues around data and privacy. In an interview with ET’s Vinod Mahanta, Leighton talks about data legislation, cyber security threats and the creation of a scalable technology infrastructure.

    Read Full Story
  • Building Amazing Apps, Part 3: Optimizing the Network
    DevOps.com
    April 17, 2019

    There are millions of apps available today, and it’s incredibly easy for any user to download and install any of them with just a few taps on a screen or click of a mouse. If you want to build and deliver an app that will amaze users, you need to be able to differentiate from the rest of the pack.

    Over the past 14 years, I’ve been working closely with the top companies delivering the most popular apps, helping them optimize their apps for speed and scale so users get a great experience. In this three-part series, we’ll explore the fundamental steps you must take to build and deliver your own amazing app at scale that will keep users coming back for more.

    Read Full Story
  • Piracy: How broadcasters are confronting the threat
    IBC365
    April 15, 2019

    When focusing on video security, it is important to define the two main kinds of risk – one is systematic, ‘for profit’ piracy’; the other the more casual, between-consumer sharing of content.

    Some of the instances of technological progression that have characterised the industry in recent years have – in turn – brought their own challenges. Alex Balford, senior media product marketing manager at Akamai, says: “The remarkable advancements that have helped make creating, sharing and distributing content incredibly easy have also exposed the industry to risks that weren’t as prevalent in a more proprietary, less digital world. More third parties and contractors are part of the content lifecycle, meaning more attack surfaces for bad actors to target and infiltrate. This can include corporate networks, websites, apps, valuable content and subscribers’ personally identifiable information to name just a few.”

    Read Full Story
  • Hacking Game of Thrones - Comment from Jérôme Renoux, Regional Sales Director at Akamai
    Global Security Mag
    April 15, 2019

    [English synopsis] With the final season of Game of Thrones set to premier on Sunday night, the Iron Throne. It’s one of the most viewed programmes in the world – despite no new episodes being released in 2018, it was still one of the most-watched shows of the year in the US, averaging audiences of 23 million per episode – and it’s now simulcast in 170 countries.

    Byline article by Akamai Regional Sales Director Jérôme Renoux.

    Read Full Story
  • Prolexic’s new Australian scrubbing center targets surging DDoS climate
    CSO Australia
    April 10, 2019

    The opening of an Australian data ‘scrubbing’ centre will play a pivotal role in helping Akamai’s Prolexic business maintain its benchmark of having enough free capacity to deal with 3 to 5 times the largest-ever distributed denial of service (DDoS) attack at any given time.

    The decision to open the new facility – which , when it opens in Melbourne later this year, will be the company’s 6th such Asia-Pacific – came as increasing customer demands made it increasingly difficult to do data-cleaning at speed at offshore facilities.

    “It was no longer appropriate for us to be driving traffic through places like Singapore and Hong Kong,” vice president of product marketing Ari Weil told CSO Australia.

    Read Full Story
  • This is what CISOs should focus on to stay longer with a firm
    ETCIO.com
    April 10, 2019

    Generally, the majority of chief information security officers (CISOs) and other enterprise security leaders don’t stay for a longer period with the same organization to be able to make a strategic difference. And the ones that stay recommend, business focus, understanding management of expectations and the ability to communicate with the stakeholders are the key to longevity in the CISO role.

    Andy Ellis, Akamai’s chief security officer from the past eight years, has played a pivotal role in implementing a zero-trust data access model that has fundamentally changed the company's security posture. Ellis believes that being at the same company for so long has been critical to his ability to affect change. "I've gotten to mold this position," Ellis told CSO. "As I've gone along, it's been like wearing a comfortable glove. I understand how the organization works; therefore, I can get more done.

    Read Full Story
  • Akamai Finds Widespread SVOD Credential Attacks From Hacking
    Streaming Media
    April 8, 2019

    Content delivery network Akamai is calling attention to a form of identity theft called "credential stuffing," which impacted millions of subscription video, music, and gaming accounts in 2018. In credential stuffing, hackers use automated programs and stolen account information to attempt access to other online sites. The attacks can be successful when people use the same password for multiple accounts. Hackers often target streaming services during these attacks since breached accounts can be sold or used for video piracy.

    According to Akamai's research, three massive credential stuffing attacks on video services in 2018 occurred after data breaches. That shows hackers were testing stolen IDs before selling them. The three attacks ranged from 133 million to 200 million login attempts.

    Read Full Story
  • Akamai integrates CDN with Microsoft Azure media services
    FierceVideo
    April 3, 2019

    Edge platform provider Akamai today announced it has integrated its content delivery network (CDN) capabilities with Microsoft Azure Media Services and Blob Storage.

    Akamai will now directly connect its edge network to Azure using an Azure ExpressRoute connection to enable efficiencies when storing and delivering content. The companies said the integration also should help provide mutual customers with lower, more predictable cost structures.

    Akamai will deliver live and on-demand streaming workflows through Azure Media Services, and use Microsoft’s cloud video workflow platform for encoding, packaging, DRM and Video AI video metadata indexing. Akamai and Microsoft plan to offer lower latency and more choices for integrated media workflows through mutual partners such as Harmonic, Telestream and more.

    Read Full Story
  • When Chrome Isn’t Chrome, and What it Means for Retailers
    TotalRetail
    April 1, 2019

    The global digital commerce market — slated to reach nearly $6 trillion by 2022 — shows no signs of slowing. This past holiday shopping season, retailers saw the strongest sales growth in the last six years, with online spending up 19.1 percent compared to 2017.

    While this is a massive opportunity for retailers to get a jump-start on optimizing their sites for future peak-traffic shopping events, it’s important they keep in mind the critical factors that could compromise their web and mobile performance, their customers’ experiences and, ultimately, their bottom lines.

    One potentially crippling (but largely overlooked) culprit that could undermine brands’ digital performance is the “rogue” mobile browser phenomenon. For example, browsers pretending to be Google Chrome, but aren’t.

    Read Full Story
  • Akamai Gets Edgy With Platform Expansion and Upgrades
    sdxCentral
    March 7, 2019

    Akamai updated its edge security, web performance, and media delivery products targeted at easing cloud migrations and operations.

    Among the numerous updates is the ability to intelligently serve or block content with a fully integrated virtual private network (VPN) and domain name system (DNS) proxy detection service. There is also a new token authentication that serves browsers and devices not supporting cookies. And, the company’s platform can now block the playback of stolen content.

    Akamai also added support for automated protection of API traffic, added attack groups across its web application firewalls, and installed advanced throttling capabilities in its API gateways.

    Ted Chamberlin, vice president and analyst at Gartner, told SDxCentral that Akamai tends to release its updates twice per year. This batch, he said, is “solid and very good directionally.”

    Read Full Story
  • How an Evolving Pay TV Infrastructure Can Coexist With OTT
    Streaming Media
    March 6, 2019

    It’s common knowledge that growth in subscriptions to online video services is continuing at a breakneck pace, while traditional pay TV is experiencing a decline. Consequently, pay TV providers are scrambling to offer a mix of programming and service models that will appeal not only to longstanding customers, but to newer generations and their anything-but-traditional viewing habits.

    Short-term tactics, such as becoming vMVPDs, or the recent trend of merging online content into existing channel lineups, may help delay the subscriber exodus but are only a partial solution. Long-term success will likely require more fundamental change. But there is good news.

    First is that, in spite of declines in the U.S. and some other parts of the world, pay TV use is still growing on a global basis and is forecasted to do so for the next few years. Second, a large percentage of viewers—over 80%—still consume live sports through cable subscriptions or other more traditional TV services. Third, pay TV operators still hold some impressive cards.

    Read Full Story
  • Don’t Let Your OTT Success Turn You Into A Data Exfiltration Victim
    The Broadcast Bridge
    March 6, 2019

    Imagine you are a creative person with technical skills and limited moral constraints. Now imagine you get the opportunity to steal the series finale for Game of Thrones weeks before the episode is broadcast or streamed. That would be worth a lot, wouldn’t it?

    Video streaming services, whether they are offered by traditional television broadcasters or digital native companies, are sitting on a gold mine. And many of those services don’t realize just how much their success has attracted the attention of the dark web.

    By 2020, the U.S. OTT market is projected to generate $21 billion, up from $16.4 billion in 2014, according to research firm MTM. To the attacker, that growth represents even more opportunity to steal. Just what are they after? Let’s look at OTT’s three pots of gold.

    Read Full Story
  • Celebrating 30 years in cybersecurity
    SC Magazine
    March 6, 2019

    Visionaries of the Last 30 Years
    Dr. Tom Leighton, CEO & Co-Founder, Akamai Technologies — When Dr. Tom Leighton, CEO and co-Founder, Akamai Technologies, first started on his journey in the early 1990s the internet was a far different animal from what is available today. He was there at MIT when he and Tim Berners-Lee watched the nascent World Wide Web start to become overwhelmed. So Tom’s ideas for content distribution and cloud industries helped set the table for what we have today. Tom holds more than 50 patents and was enshrined in the National Inventors Hall of Fame in 2017. He has served on the President’s American Technology Council, and from 2003 to 2005, he served on the President’s Information Technology Advisory Committee and chaired its Subcommittee on Cybersecurity. He is also a member the National Academy of Sciences, the National Academy of Engineering, and the American Academy of Arts and Sciences.

    Read Full Story
  • Trolley Talk, RSA 2019 edition: SC’s second annual cable car chats (video)
    SC Magazine
    March 6, 2019

    SC Media’s Senior Reporter Bradley Barth once again commutes to Fisherman’s Wharf with several top cybersecurity execs and for the first time a pair of undercover wireless research “workmen” come along for the ride.

    All aboard for Andy Ellis, CSO, Akamai. Andy takes on the recent spate of credential stuffing attacks, addresses the IoT botnet plague, and offers perspective on why humans are better at risk management than we might think.

    Read Full Story
  • Building Amazing Apps, Part 2: Optimizing the Back End
    DevOps.com
    February 28, 2019

    There are millions of apps available today, and it’s incredibly easy for any user to download and install any of them with just a few taps on a screen or click of a mouse. If you want to build and deliver an app that will amaze users, you need to be able to differentiate from the rest of the pack.

    Over the past 14 years, I’ve been working closely with the top companies delivering the most popular apps, helping them optimize their apps for speed and scale so users get a great experience. In this three-part series, we’ll explore the fundamental steps you must take to build and deliver your own amazing app at scale that will keep users coming back for more.

    We’ll break these steps down into three key areas:

    • Front end: Covers the parts of the app that end users interact with.
    • Back end: Looks at the required origin infrastructure to support the app, including databases, application, web servers and more.
    • Middle-mile: Explores the internet, where all the information needs to traverse back and forth between the front end and back end.
    Byline article by Akamai Developer Evangelist Javier Garza.

    Read Full Story
  • Retailers have become the top target for credential stuffing attacks
    ZDNet
    February 27, 2019

    Retailers are now the favorite target of cybercriminals looking to cash in through easy, automated credential stuffing attacks.

    Point-of-sale (PoS) malware has been -- and still is -- a common way to infiltrate retail systems and steal valuable credit card data. However, given the explosion in leaked data and bulk card number sets now available for next to nothing in the web's underbelly, this has given rise to a new technique to steal hard-won cash from shoppers without the need to infect physical equipment.

    According to Akamai's 2019 State of the Internet report , released on Wednesday, the retail sector was the top target for credential stuffing techniques in the second half of 2018.

    Read Full Story
  • Iron Mountain launches data center emissions-tracking program
    Windpower Engineering & Technology
    February 27, 2019

    Iron Mountain, an information management services provider, launched a new data center renewable energy reporting solution called Green Power Pass (GPP).

    Early adopters include Akamai, Arizona State University, and WeWork.

    “Akamai believes that operating our business with a small environmental footprint is fundamental to unlocking the potential of the internet and an essential value for our customers and the communities in which we operate,” said Robert Blumofe, executive VP of the Enterprise Division at Akamai. “We strive to incorporate our sustainability principles into our business relationships by seeking similar commitments from our major suppliers. We are pleased to be a launch partner of Iron Mountain’s Green Power Pass, allowing us to deliver services to our customers in a sustainable and socially responsible way through 100% renewable power.”

    Read Full Story
  • Akamai, MUFG enter JV for blockchain-based online payment network
    Enterprise Innovation
    February 22, 2019

    Akamai Technologies, Inc. and Mitsubishi UFJ Financial Group have established a joint venture, the Global Open Network, Inc. (GO-NET) and announced their plans to offer a new blockchain-based online payment network enabling next-generation transaction security, scale and responsiveness.

    GO-NET is the result of more than three years of close collaboration between Akamai and MUFG. Both Akamai and MUFG will be investors in GO-NET, which is expected to make the new payment network available in Japan during the first half of 2020. GO-NET aims to provide a comprehensive set of services, including support for existing payment processing functions, pay-per-use, micropayments and other developing IoT-enabled payment transactions.

    Critical to the joint venture will be Akamai’s innovative Blockchain as a Service solution, which will leverage its globally distributed Intelligent Edge Platform to power the online payment network.

    Read Full Story
  • Bots try to break the internet, and other trends for 2019
    TechRadar
    February 21, 2019

    From the largest DDoS attacks ever seen and record-breaking numbers of data breaches, to the implementation of the General Data Protection Regulation ( GDPR ) in May, 2018 will be remembered as an extraordinary year for the cybersecurity industry.

    With hackers developing increasingly sophisticated ways to attack enterprises every day, one of the most important lessons from this year is how crucial it is to stay one step ahead of cybercriminals at all times. In order to continuously protect company and customer data, businesses need to have an understanding of not only cybersecurity threats now, but also in the far future.

    Although no one can say for certain what 2019 will bring, we can look to the past to understand the trends of tomorrow. As technology has evolved, it’s been accompanied by smarter, more malicious and much harder to detect threats. With the ever-increasing intelligence of bots, the increasing complexity of clouds and rising IoT risks, as well as the impact of data regulations, cybersecurity will dominate boardroom conversations.

    Byline article by Akamai Senior Director of Security Planning and Strategy Jay Coley.

    Read Full Story
  • 9 Years After: From Operation Aurora to Zero Trust
    Dark Reading
    February 20, 2019

    It's January 12, 2010. In a blog post, Google publicly discloses that it has been the victims of a targeted attack originating in China. The attack resulted in the theft of intellectual property, but the attackers didn't stop with Google — they targeted at least 20 different organizations across the globe, in an attack that would later become known as Operation Aurora .

    Operation Aurora was a shock for many organizations because it made everyone face a new kind of threat, one that previously was only whispered about around the watercooler. A government-backed adversary, with near-unlimited resources and time, had struck the world's largest Internet company — and almost got away with it.

    No one wanted to be the first to call Operation Aurora a nation-state attack. The possibility was certainly there, but the fear was that by rushing to attribution and getting it wrong could mean the first person to speak would be viewed as Chicken Little for the rest of his or her career.

    Here at Akamai, one of the companies targeted by Aurora, the attacks became a primary driver for change.

    Byline article by Akamai CSO Andy Ellis.

    Read Full Story
  • Akamai CEO Predicts Strong Year for Growth in 2019
    Bloomberg TV
    February 13, 2019

    Tom Leighton, Akamai chief executive officer, discusses the company's blockchain-based payment network and its growth prospects for 2019 with Bloomberg’s Emily Chang on “Bloomberg Technology.”

    Read Full Story
  • Gift Card Grinches: Stopping Bots From Stealing the Holiday Spirit
    Total Retail
    February 13, 2019

    The holidays have come and gone, so it's time to analyze what transpired last November and December. No one wants to ask for more “things,” but the holidays is the time for giving — which is why gift cards were the most requested present, showing up on 60 percent of wish lists , according to a survey by the National Retail Federation (NRF). However, nothing is more upsetting for consumers who go to use their gift card only to find out that it has been fraudulently drained by hackers before it can be used.

    Analysis of online traffic patterns during the 2017 holiday season by Akamai showed that retail sites experienced the most web attacks compared to other industries. And as the holiday season ramped up last year, we saw those same threats come back like the Grinch to steal the holiday spirit.

    Byline article by Akamai Director of Product Marketing Renny Shen.

    Read Full Story
  • Clever Phishing Attack Enlists Google Translate to Spoof Facebook Login Page
    ThreatPost
    February 6, 2019

    Recently-discovered phishing emails scoop up victims’ Facebook and Google credentials and hides its malicious landing page via a novice method – Google Translate.

    The phishing campaign uses a two-stage attack to target both Google and Facebook usernames and passwords, according to researchers at Akamai who posted a Tuesday analysis. But in a tricky twist of events, the scam also evades detection through burying its landing page in a Google Translate page – meaning that victims sees a legitimate Google domain and are more likely to input their credentials.

    “When it comes to phishing, criminals put a lot of effort into making their attacks look legitimate, while putting pressure on their victims to take action,” Larry Cashdollar, with Akamai, said in a Tuesday post . “This is an interesting attack, as it uses Google Translate, and targets multiple accounts in one go.”

    Read Full Story
  • Best Practices For Premium Video Streaming, Part 5: Performance Testing
    Streaming Media
    February 4, 2019

    OTT distributors are discovering that even seemingly minor glitches in online video quality have the potential to undermine results. Their ability to maintain comprehensive quality control (QC) has become mission-critical in a highly competitive market where viewers have shown little tolerance for poor performance. Knowing how consumers are reacting to their services is essential, and the ability to confirm execution of ad performance is becoming ever more important to bottom lines.

    Meeting QC requirements is a tall order, given the range of applications and touchpoints involved in any given streaming scenario. Distributors need visibility into everything impacting the content flow, from initial processing to end-user playback. They must be able to easily assess the effectiveness of playback, including advertising and applications supporting DVR and time shifting.

    This piece explores monitoring, analytics, and other best practices that are essential to both achieving desired streaming performance and producing optimal viewing experiences and financial returns.

    Read Full Story
  • Q&A with Akamai CTO after acquisition of Janrain
    ClickZ
    January 31, 2019

    Earlier this month, Massachusetts-based Akamai Technologies announced their agreement to acquire Portland-based Janrain, a leading customer identity access management (CIAM) company.

    Janrain’s CIAM technology allows organizations to securely capture and manage customer identity, as well as control customer access to services.

    Akamai has already positioned itself as one of the world’s largest content delivery networks (CDN) and cloud service providers.

    This acquisition promises an even more robust and comprehensive digital strategy against identity fraud. To understand a bit more about what this acquisition means, ClickZ sat down with Akamai VP and Chief Technology Officer John Summers.

    Read Full Story
  • The DDoS that wasn’t: a key takeaway for web domain security
    ZDNet
    January 29, 2019

    When Akamai noticed an uptick in traffic to a web domain, the company could be forgiven for thinking: another day, another distributed denial-of-service (DDoS) attack.

    DDoS attacks are a common attack method, accessible to all, which utilizes malicious traffic to disrupt website operations and online services. Traffic is often generated through botnets made up of enslaved devices ranging from PCs to Internet of Things (IoT) products including routers, smart lighting, and smartphones, which are issued a command to visit a website at the same time.

    Sudden traffic spikes can overload systems and prevent legitimate users from accessing an online resource.

    Read Full Story
  • 2018 peak holiday web traffic analysis and lessons learned
    Internet Retailer
    January 28, 2019

    Predicting and preparing for peak traffic volume and resource demands is a difficult task for online retailers around the world. They need to be ready for both expected and unexpected traffic spikes at any time. No one wants the CEO on their doorstep asking why their website is down and losing revenue every second it remains offline.

    In this post, we’ll review key web performance insights that Akamai saw globally in the 2018 holiday shopping season, including:

    • The continued rise of mobile
    • Who the mobile customer is
    • Conversion and bounce rates
    Byline article by Akamai Director of Industry Marketing Chris Wraight.

    Read Full Story
  • Tune up your TV for Super Bowl Sunday
    Tech It Out
    January 26, 2019

    [Audio] What to look for in a new TV and tune-up tips ahead of Super Bowl Sunday, with Akamai’s Peter Chave.

    Akamai segment begins at 26:34.

    Read Full Story
  • Want Better Customer Relationships? Walk A Mile In Their Shoes
    MediaPost
    January 25, 2019

    There’s no denying that satisfied customers are key to the health of any business. It’s important for business leaders to ensure that they’re not only meeting, but exceeding, customer expectations.

    And one of the most important steps any company can take to better serve its client base is to get inside the head of these key stakeholders to understand their business needs and challenges.

    My company helps deliver online video content for streaming providers, broadcasters, and social media sites and for live events. To demonstrate our solutions onsite in a live environment, we created and streamed a live online broadcast program from the show floor of IBC, the annual broadcast technology conference in Amsterdam.

    The project was no small undertaking, but our biggest triumph were the lessons we learned from spending a couple days in our customers’ shoes.

    Byline article by Akamai Principal Architect Peter Chave.

    Read Full Story
  • Fighting Fire with Fire: API Automation Risks
    ThreatPost
    January 24, 2019

    Akamai research shows that 83 percent of all traffic on the web today are API calls (JSON / XML). In many cases this fast growth can be attributed to the adoption and popularity of mobile devices and the mobile app ecosystem, as well as the abuse by threat actors using bots to automate their manual attack processes. It’s been established that attackers are targeting public facing API’s that can be easily discovered, but there’s a whole other attack surface that’s getting little attention.

    In this article, I’ll discuss API attack trends, the current (and failing) architectural designs for addressing security of these API transactions, attacker techniques, as well as common tools that can be used to identify your own attack surface and deploy the appropriate defenses.

    Byline article by Akamai Senior Manager of Security Technology & Strategy Tony Lauro.

    Read Full Story
  • M&A wrap: Akamai, Janrain, LLR, Thoma Bravo, Wind Point
    Merger&Acquisitions
    January 24, 2019

    Akamai Technologies (Nasdaq: AKAM) has acquired cybersecurity provider Janrain. The target helps protect businesses from cyberattacks by securing their websites and digital presence. "Adding identity management to the Akamai Edge will provide an added layer of security for our customers," says Akamai CEO Tom Leighton (pictured). "With our acquisition now complete, we can work towards providing them with a sophisticated identity management solution, enabling trusted digital experiences for their end users." As companies continue to adopt cloud technologies and digitize their businesses, web security and identity awareness have become increasingly critical to keeping businesses secure. Demand for new and improved offerings has created a healthy appetite for M&A with cybersecurity-related companies. LLR Partners invested in PhishLabs; Thoma Bravo-backed Centrify; and Zix Corp. (Nasdaq: ZIXI) is buying AppRiver from Marlin Equity Partners.

    Read Full Story
  • Will people ditch cash for cryptocurrency? Japan is about to find out
    MIT Technology Review
    January 22, 2019

    Mitsubishi UFJ Financial Group (MUFG), the country’s largest bank and the fifth largest in the world by total assets, has teamed with American internet company Akamai to build a blockchain-based consumer payment network in time for the Olympics. If they pull it off, it could be the fastest and most powerful consumer payment network to date. They claim that in tests it’s been able to handle more than a million transactions per second, with each transaction confirmed in two seconds or less, and say it could eventually achieve 10 million transactions per second. (Visa’s credit card network, by comparison, handles several thousand transactions per second. Bitcoin tops out at about seven transactions per second, and each transaction can take up to an hour to confirm.) The system is designed to handle all kinds of payments, from automated highway tolls to payment-card swipes to in-app purchases.

    Read Full Story
  • Why traffic to retail websites was quiet on Christmas but picked up on Boxing Day
    Internet Retailer
    January 22, 2019

    As we have seen throughout the recent global peak traffic holiday period, online retailers need to be prepared to offer optimal customer experiences to mobile visitors (including mobile app and web browser interaction) as their overall usage is greater than desktop users and their use has gone beyond research and includes purchasing.

    Until now, significant time and budget have been invested optimizing web applications and content for desktop visitors. This focus should not diminish but, as we saw, the percentage of mobile visitors exceeded desktop visitors during ALL of the major holiday events, with no sign of reversing in 2019. This trend underscores the importance of prioritizing an optimal mobile customer experience, but not at the expense of desktop optimization.

    Byline article by Akamai Director of Industry Marketing Chris Wraight.

    Read Full Story
  • Stations Have Growing Options For Local OTT
    TVNewsCheck
    January 17, 2019

    Akamai’s Media Services Live helps content providers ingest and prepare their live streams for a smooth viewing experience. Net Storage is a globally distributed, cloud-based storage solution that caches content as close to viewers as possible.

    Akamai also addresses security. It is no longer just about digital rights management and secure TV Everywhere authentication, he says.

    “The bad guys have noticed OTT because they see money there,” Keats says. The combination of personal information and credit card info tied to subscription or transactional services makes an attractive target, he says.

    Read Full Story
  • New Attacks Target Recent PHP Framework Vulnerability
    Dark Reading
    January 17, 2019

    Last month a code execution vulnerability was found in the ThinkPHP framework, a rapid-development framework developed by Chinese firm TopThink. While the vulnerability, designated CVE-2018-20062, was patched by the developer, a researcher has now found active exploits of the vulnerability in the wild.

    Larry Cashdollar, a vulnerability researcher and member of Akamai's Security Incident Response Team, was doing research on a recent Magecart attack targeting extensions to the Magento e-commerce platform when he noticed a malware request he hadn't seen before – a request to ThinkPHP.

    “I realized there was a software framework developed in China that had this vulnerability, and it was being taken advantage of to install coin miners and skimmers,” Cashdollar says. “They [also] were using it to install any kind of payload targeting Windows machines, IoT devices, or to mine Bitcoin or Monero coins.”

    Read Full Story
  • The Best Employers For Diversity 2019
    Forbes
    January 15, 2019

    Forbes partnered with market research company Statista to create our second annual ranking of America’s best employers for diversity . The list was compiled by surveying 50,000 Americans working for businesses with at least 1,000 employees, and it features some businesses whose appearance on the list, in light of recent events, may come as a surprise.

    #318 Akamai Technologies
    Akamai Technologies, Inc. provides cloud services for delivering, optimizing and securing online content and business applications. Its solutions include delivery of conventional content on websites to tools that support the delivery and operation of cloud-based applications, as well as security solutions and live and on-demand streaming video capabilities. The company was founded by Frank Thomson Leighton, Jonathan Seelig, Randall Kaplan and Daniel Mark Lewin on August 20, 1998 and is headquartered in Cambridge, MA.

    Read Full Story
  • Q&A: Patrick Sullivan on Using Zero-Trust Networks to Boost Higher Ed Cybersecurity
    EdTech Magazine
    January 10, 2019

    The education sector was particularly vulnerable to cyberattacks last year, a study found in mid-December , and security experts are concerned that 2019 will bring a new round of threats that are more sophisticated than ever.

    “No industry or institution is immune from cyberattacks, not even Harvard,” says Akamai global director Patrick Sullivan. “Thousands of students — often from all over the world — access the internet at colleges and universities, and bring any vulnerabilities or malware their computers pick up off-campus with them.”

    EdTech spoke with Sullivan about how a new network access structure may help universities better guarantee the privacy and protection of network users on campus.

    Read Full Story
  • Building Amazing Apps, Part 1: Optimizing the Front End
    DevOps.com
    January 9, 2019

    There are millions of apps available today, and it’s incredibly easy for any user to download and install any of them with just a few taps on a screen or click of a mouse. If you want to build and deliver an app that will amaze users, you need to be able to differentiate from the rest of the pack.

    Over the past 14 years, I’ve been working closely with the top companies delivering the most popular apps, helping them optimize their apps for speed and scale so users get a great experience. In this three-part series, we’ll explore the fundamental steps you must take to build and deliver your own amazing app at scale that will keep users coming back for more.

    Byline article by Akamai Developer Evangelist Javier Garza

    Read Full Story
  • Akamai acquires Janrain to strengthen identity access controls, bot protection
    ZDNet
    January 8, 2019

    Akamai has acquired Janrain in a bid to improve security access controls and identity management.

    On Monday, John Summers, Akamai VP & CTO announced the purchase, which is designed to improve Akamai's position in "securing against expanding threats while also enabling superior web experiences."

    Read Full Story
  • Identify as Security Key: Akamai Buys Online Access Firm Janrain
    Xconomy
    January 8, 2019

    Logins, passwords, security questions, and dual authentications all try to tackle the identity issue that centers on whether a website can trust that a user is who they say they are and—from the other side—whether a user can trust their account is opened up to them and only them.

    It’s also the reason why Cambridge, MA-based Akamai Technologies (NASDAQ: AKAM), a provider of Internet content delivery network services and cybersecurity technologies, plunked down an undisclosed sum to buy Portland, OR-based online identity management company Janrain.

    “Identity is a key component to be able to mitigate both the current generation of attacks and the general going forward,” says John Summers, Akamai chief technology officer. “Linking the digital identity to real work identity is a direction the industry needs to go.”

    Read Full Story
  • Business-critical IoT “Platform” to Become the New Black
    VM Blog
    January 8, 2019

    In 2019, IoT is poised to transform businesses and as industry itself, providing increasingly valuable connected data to the enterprise, making strides to fill security gaps within the development process and seeing increasing investments in IoT platforms.

    Akamai CTO of IoT and Mobile Lior Netzer shares more on how he expects these trends will unfold in the year ahead.

    IoT data will become a business-critical resource in 2019. As the enterprise increasingly adopts IoT devices and sensors, the volume of data generated by these devices and sensors increases too, providing a trove of valuable insights. At the same time, machine learning and artificial intelligence-driven data analytics will continue to mature, meaning IoT data analysis will become easier. Through a collaborative and multidisciplinary effort, businesses will be able to glean deeper insight from their connected data, (such as cross-correlating inputs from discrete sensors for better decision making,) ultimately leading to smarter business decisions.

    Read Full Story
  • Why Akamai Agreed to Acquire Janrain
    Bloomberg TV
    January 7, 2019

    Tom Leighton, Akamai chief executive officer, discusses the company's acquisition of Janrain and the demand for cybersecurity software with Bloomberg's Caroline Hyde, Joe Weisenthal and Romaine Bostick on “Bloomberg Markets: What'd You Miss?”

    Read Full Story
  • Data management in 2019
    Federal News Network
    January 7, 2019

    Most listeners know about Akamai because of its decades-long reputation for improving speed of delivery of Internet services world-wide. Well, today’s Akamai has taken advantage of its position as a leader in cyber security as well.

    It makes sense — if your foundation is understanding network traffic, you can build on that expertise to control malicious traffic as well.

    This week on Federal Tech Talk , Patrick Sullivan, director of Security Technology and Strategy at Akamai , talked about Zero Trust, bots, bot networks, software defined networks and . . . whew . . . security operations centers.

    Read Full Story
  • Predictions for 2019: Viewers will have to wait to see wide-reaching 5G impact
    SVG Europe
    January 3, 2019

    If you listen to any current presentation relating to 5G and broadcasting, you will be excused if you come away feeling less than enthused. Over the last few years, 2019 was hailed by many to be a big year for mobile connectivity and video delivery as 5G services began to roll out.

    The argument was clear, as 5G develops, so too does the ability to deliver higher-quality video, both to mobile devices and to viewers who are ‘off the grid’ for fixed broadband connectivity. Many have even proffered that the future of linear broadcasting will be determined by 3GPP.

    But, as we dig under the skin of the promise, we can see that serious adoption of 5G services for linear delivery won’t happen until after 2023 at a minimum. We can predict however that 2019 will see more trials and a better understanding of what the technology can really bring to the table.

    Read Full Story
  • Hackers Hijack Chromecast Devices and Smart TVs via Exposed UPnP
    Security Boulevard
    January 3, 2019

    The CastHack code has been released on GitHub, so other attackers can now hijack exposed devices, potentially for malicious reasons such as displaying scareware/ransomware notes or other types of scams.

    Also, the risk posed by insecure UPnP implementations is much greater than rogue messages on people’s TVs. In November, researchers from Akamai warned that hackers are exploiting UPnP in routers to attack LAN computers over SMB. The same technique, called UPnProxy, was used in the past to proxy malicious traffic through people’s routers.

    According to Akamai, there are an estimated 3.5 million devices that expose their UPnP endpoints to the internet and 277,000 of them are vulnerable to UPnProxy attacks.

    Read Full Story
  • Zero trust pushes agencies away from an outdated approach to cybersecurity
    Federal News Network
    January 1, 2019

    With the ever-growing list of devices connected to your agency’s network, the emergence of operational technology (OT), not just information technology (IT) as a cyber threat, and wide acceptance of cloud computing, enabling a zero trust network is not only possible, but absolutely necessary.

    Randy Wood, vice president of U.S. public sector sales for Akamai, said zero trust is not a new idea, but one that is about five years old. It promotes the simple concept that trust is not an attribute of location, and just because an employee is trusted inside perimeter, it doesn’t mean he or she should be granted access to all the information.

    “We are operating under an outdated paradigm that the network and perimeter have traditionally defined the boundaries of security. But we know the way the government is working today in a cloud, hybrid and on-premise fashion, that model doesn’t work,” Wood said on the Innovation in Government show. “Zero trust is the idea of trusting no one, no device and no application. It also requires authenticating and authorizing absolutely everyone independent of where they are and what device they have.”

    Read Full Story
  • Industry captains place big bets on new-age tech
    LiveMint
    January 1, 2019

    Mint asked top company bosses how they see disruptive technologies such as artificial intelligence, blockchain and 5G impacting Indian firms.

    Prasad Mandava, MD (India) and VP (Engineering), Akamai
    Thoughts on AI (Machine Learning, Deep Learning), Blockchain, IoT, AR-VR, 3D Printing, Automation and Robotics.

    All these technologies hold promise in time to come. At Akamai, we’re thinking ahead to 2020 in fact. In the area of blockchain for example, we entered into a partnership with MUFG, one of the world’s leading financial groups, to offer a new blockchain-based online payment network enabling next-generation payment transaction scale and responsiveness. This hyper-scale payment network, powered by an innovative and newly-developed blockchain architecture, is designed to be capable of processing more than one million transactions per second at latencies of less than two seconds per transaction. The underlying blockchain architecture is expected to be extensible to 10 million transactions per second. MUFG and Akamai intend to leverage the technology, built and deployed on the Akamai Intelligent Platform, to offer a new payment network expected to be available in Japan during the first half of 2020.

    Read Full Story

View Previous Stories