In The News

The latest articles, blog posts and newscasts mentioning Akamai

  • Akamai Gets Edgy With Platform Expansion and Upgrades
    sdxCentral
    March 7, 2019

    Akamai updated its edge security, web performance, and media delivery products targeted at easing cloud migrations and operations.

    Among the numerous updates is the ability to intelligently serve or block content with a fully integrated virtual private network (VPN) and domain name system (DNS) proxy detection service. There is also a new token authentication that serves browsers and devices not supporting cookies. And, the company’s platform can now block the playback of stolen content.

    Akamai also added support for automated protection of API traffic, added attack groups across its web application firewalls, and installed advanced throttling capabilities in its API gateways.

    Ted Chamberlin, vice president and analyst at Gartner, told SDxCentral that Akamai tends to release its updates twice per year. This batch, he said, is “solid and very good directionally.”

    Read Full Story
  • How an Evolving Pay TV Infrastructure Can Coexist With OTT
    Streaming Media
    March 6, 2019

    It’s common knowledge that growth in subscriptions to online video services is continuing at a breakneck pace, while traditional pay TV is experiencing a decline. Consequently, pay TV providers are scrambling to offer a mix of programming and service models that will appeal not only to longstanding customers, but to newer generations and their anything-but-traditional viewing habits.

    Short-term tactics, such as becoming vMVPDs, or the recent trend of merging online content into existing channel lineups, may help delay the subscriber exodus but are only a partial solution. Long-term success will likely require more fundamental change. But there is good news.

    First is that, in spite of declines in the U.S. and some other parts of the world, pay TV use is still growing on a global basis and is forecasted to do so for the next few years. Second, a large percentage of viewers—over 80%—still consume live sports through cable subscriptions or other more traditional TV services. Third, pay TV operators still hold some impressive cards.

    Read Full Story
  • Don’t Let Your OTT Success Turn You Into A Data Exfiltration Victim
    The Broadcast Bridge
    March 6, 2019

    Imagine you are a creative person with technical skills and limited moral constraints. Now imagine you get the opportunity to steal the series finale for Game of Thrones weeks before the episode is broadcast or streamed. That would be worth a lot, wouldn’t it?

    Video streaming services, whether they are offered by traditional television broadcasters or digital native companies, are sitting on a gold mine. And many of those services don’t realize just how much their success has attracted the attention of the dark web.

    By 2020, the U.S. OTT market is projected to generate $21 billion, up from $16.4 billion in 2014, according to research firm MTM. To the attacker, that growth represents even more opportunity to steal. Just what are they after? Let’s look at OTT’s three pots of gold.

    Read Full Story
  • Celebrating 30 years in cybersecurity
    SC Magazine
    March 6, 2019

    Visionaries of the Last 30 Years
    Dr. Tom Leighton, CEO & Co-Founder, Akamai Technologies — When Dr. Tom Leighton, CEO and co-Founder, Akamai Technologies, first started on his journey in the early 1990s the internet was a far different animal from what is available today. He was there at MIT when he and Tim Berners-Lee watched the nascent World Wide Web start to become overwhelmed. So Tom’s ideas for content distribution and cloud industries helped set the table for what we have today. Tom holds more than 50 patents and was enshrined in the National Inventors Hall of Fame in 2017. He has served on the President’s American Technology Council, and from 2003 to 2005, he served on the President’s Information Technology Advisory Committee and chaired its Subcommittee on Cybersecurity. He is also a member the National Academy of Sciences, the National Academy of Engineering, and the American Academy of Arts and Sciences.

    Read Full Story
  • Trolley Talk, RSA 2019 edition: SC’s second annual cable car chats (video)
    SC Magazine
    March 6, 2019

    SC Media’s Senior Reporter Bradley Barth once again commutes to Fisherman’s Wharf with several top cybersecurity execs and for the first time a pair of undercover wireless research “workmen” come along for the ride.

    All aboard for Andy Ellis, CSO, Akamai. Andy takes on the recent spate of credential stuffing attacks, addresses the IoT botnet plague, and offers perspective on why humans are better at risk management than we might think.

    Read Full Story
  • Building Amazing Apps, Part 2: Optimizing the Back End
    DevOps.com
    February 28, 2019

    There are millions of apps available today, and it’s incredibly easy for any user to download and install any of them with just a few taps on a screen or click of a mouse. If you want to build and deliver an app that will amaze users, you need to be able to differentiate from the rest of the pack.

    Over the past 14 years, I’ve been working closely with the top companies delivering the most popular apps, helping them optimize their apps for speed and scale so users get a great experience. In this three-part series, we’ll explore the fundamental steps you must take to build and deliver your own amazing app at scale that will keep users coming back for more.

    We’ll break these steps down into three key areas:

    • Front end: Covers the parts of the app that end users interact with.
    • Back end: Looks at the required origin infrastructure to support the app, including databases, application, web servers and more.
    • Middle-mile: Explores the internet, where all the information needs to traverse back and forth between the front end and back end.
    Byline article by Akamai Developer Evangelist Javier Garza.

    Read Full Story
  • Retailers have become the top target for credential stuffing attacks
    ZDNet
    February 27, 2019

    Retailers are now the favorite target of cybercriminals looking to cash in through easy, automated credential stuffing attacks.

    Point-of-sale (PoS) malware has been -- and still is -- a common way to infiltrate retail systems and steal valuable credit card data. However, given the explosion in leaked data and bulk card number sets now available for next to nothing in the web's underbelly, this has given rise to a new technique to steal hard-won cash from shoppers without the need to infect physical equipment.

    According to Akamai's 2019 State of the Internet report , released on Wednesday, the retail sector was the top target for credential stuffing techniques in the second half of 2018.

    Read Full Story
  • Iron Mountain launches data center emissions-tracking program
    Windpower Engineering & Technology
    February 27, 2019

    Iron Mountain, an information management services provider, launched a new data center renewable energy reporting solution called Green Power Pass (GPP).

    Early adopters include Akamai, Arizona State University, and WeWork.

    “Akamai believes that operating our business with a small environmental footprint is fundamental to unlocking the potential of the internet and an essential value for our customers and the communities in which we operate,” said Robert Blumofe, executive VP of the Enterprise Division at Akamai. “We strive to incorporate our sustainability principles into our business relationships by seeking similar commitments from our major suppliers. We are pleased to be a launch partner of Iron Mountain’s Green Power Pass, allowing us to deliver services to our customers in a sustainable and socially responsible way through 100% renewable power.”

    Read Full Story
  • Akamai, MUFG enter JV for blockchain-based online payment network
    Enterprise Innovation
    February 22, 2019

    Akamai Technologies, Inc. and Mitsubishi UFJ Financial Group have established a joint venture, the Global Open Network, Inc. (GO-NET) and announced their plans to offer a new blockchain-based online payment network enabling next-generation transaction security, scale and responsiveness.

    GO-NET is the result of more than three years of close collaboration between Akamai and MUFG. Both Akamai and MUFG will be investors in GO-NET, which is expected to make the new payment network available in Japan during the first half of 2020. GO-NET aims to provide a comprehensive set of services, including support for existing payment processing functions, pay-per-use, micropayments and other developing IoT-enabled payment transactions.

    Critical to the joint venture will be Akamai’s innovative Blockchain as a Service solution, which will leverage its globally distributed Intelligent Edge Platform to power the online payment network.

    Read Full Story
  • Bots try to break the internet, and other trends for 2019
    TechRadar
    February 21, 2019

    From the largest DDoS attacks ever seen and record-breaking numbers of data breaches, to the implementation of the General Data Protection Regulation ( GDPR ) in May, 2018 will be remembered as an extraordinary year for the cybersecurity industry.

    With hackers developing increasingly sophisticated ways to attack enterprises every day, one of the most important lessons from this year is how crucial it is to stay one step ahead of cybercriminals at all times. In order to continuously protect company and customer data, businesses need to have an understanding of not only cybersecurity threats now, but also in the far future.

    Although no one can say for certain what 2019 will bring, we can look to the past to understand the trends of tomorrow. As technology has evolved, it’s been accompanied by smarter, more malicious and much harder to detect threats. With the ever-increasing intelligence of bots, the increasing complexity of clouds and rising IoT risks, as well as the impact of data regulations, cybersecurity will dominate boardroom conversations.

    Byline article by Akamai Senior Director of Security Planning and Strategy Jay Coley.

    Read Full Story
  • 9 Years After: From Operation Aurora to Zero Trust
    Dark Reading
    February 20, 2019

    It's January 12, 2010. In a blog post, Google publicly discloses that it has been the victims of a targeted attack originating in China. The attack resulted in the theft of intellectual property, but the attackers didn't stop with Google — they targeted at least 20 different organizations across the globe, in an attack that would later become known as Operation Aurora .

    Operation Aurora was a shock for many organizations because it made everyone face a new kind of threat, one that previously was only whispered about around the watercooler. A government-backed adversary, with near-unlimited resources and time, had struck the world's largest Internet company — and almost got away with it.

    No one wanted to be the first to call Operation Aurora a nation-state attack. The possibility was certainly there, but the fear was that by rushing to attribution and getting it wrong could mean the first person to speak would be viewed as Chicken Little for the rest of his or her career.

    Here at Akamai, one of the companies targeted by Aurora, the attacks became a primary driver for change.

    Byline article by Akamai CSO Andy Ellis.

    Read Full Story
  • Akamai CEO Predicts Strong Year for Growth in 2019
    Bloomberg TV
    February 13, 2019

    Tom Leighton, Akamai chief executive officer, discusses the company's blockchain-based payment network and its growth prospects for 2019 with Bloomberg’s Emily Chang on “Bloomberg Technology.”

    Read Full Story
  • Gift Card Grinches: Stopping Bots From Stealing the Holiday Spirit
    Total Retail
    February 13, 2019

    The holidays have come and gone, so it's time to analyze what transpired last November and December. No one wants to ask for more “things,” but the holidays is the time for giving — which is why gift cards were the most requested present, showing up on 60 percent of wish lists , according to a survey by the National Retail Federation (NRF). However, nothing is more upsetting for consumers who go to use their gift card only to find out that it has been fraudulently drained by hackers before it can be used.

    Analysis of online traffic patterns during the 2017 holiday season by Akamai showed that retail sites experienced the most web attacks compared to other industries. And as the holiday season ramped up last year, we saw those same threats come back like the Grinch to steal the holiday spirit.

    Byline article by Akamai Director of Product Marketing Renny Shen.

    Read Full Story
  • Clever Phishing Attack Enlists Google Translate to Spoof Facebook Login Page
    ThreatPost
    February 6, 2019

    Recently-discovered phishing emails scoop up victims’ Facebook and Google credentials and hides its malicious landing page via a novice method – Google Translate.

    The phishing campaign uses a two-stage attack to target both Google and Facebook usernames and passwords, according to researchers at Akamai who posted a Tuesday analysis. But in a tricky twist of events, the scam also evades detection through burying its landing page in a Google Translate page – meaning that victims sees a legitimate Google domain and are more likely to input their credentials.

    “When it comes to phishing, criminals put a lot of effort into making their attacks look legitimate, while putting pressure on their victims to take action,” Larry Cashdollar, with Akamai, said in a Tuesday post . “This is an interesting attack, as it uses Google Translate, and targets multiple accounts in one go.”

    Read Full Story
  • Best Practices For Premium Video Streaming, Part 5: Performance Testing
    Streaming Media
    February 4, 2019

    OTT distributors are discovering that even seemingly minor glitches in online video quality have the potential to undermine results. Their ability to maintain comprehensive quality control (QC) has become mission-critical in a highly competitive market where viewers have shown little tolerance for poor performance. Knowing how consumers are reacting to their services is essential, and the ability to confirm execution of ad performance is becoming ever more important to bottom lines.

    Meeting QC requirements is a tall order, given the range of applications and touchpoints involved in any given streaming scenario. Distributors need visibility into everything impacting the content flow, from initial processing to end-user playback. They must be able to easily assess the effectiveness of playback, including advertising and applications supporting DVR and time shifting.

    This piece explores monitoring, analytics, and other best practices that are essential to both achieving desired streaming performance and producing optimal viewing experiences and financial returns.

    Read Full Story
  • Q&A with Akamai CTO after acquisition of Janrain
    ClickZ
    January 31, 2019

    Earlier this month, Massachusetts-based Akamai Technologies announced their agreement to acquire Portland-based Janrain, a leading customer identity access management (CIAM) company.

    Janrain’s CIAM technology allows organizations to securely capture and manage customer identity, as well as control customer access to services.

    Akamai has already positioned itself as one of the world’s largest content delivery networks (CDN) and cloud service providers.

    This acquisition promises an even more robust and comprehensive digital strategy against identity fraud. To understand a bit more about what this acquisition means, ClickZ sat down with Akamai VP and Chief Technology Officer John Summers.

    Read Full Story
  • The DDoS that wasn’t: a key takeaway for web domain security
    ZDNet
    January 29, 2019

    When Akamai noticed an uptick in traffic to a web domain, the company could be forgiven for thinking: another day, another distributed denial-of-service (DDoS) attack.

    DDoS attacks are a common attack method, accessible to all, which utilizes malicious traffic to disrupt website operations and online services. Traffic is often generated through botnets made up of enslaved devices ranging from PCs to Internet of Things (IoT) products including routers, smart lighting, and smartphones, which are issued a command to visit a website at the same time.

    Sudden traffic spikes can overload systems and prevent legitimate users from accessing an online resource.

    Read Full Story
  • 2018 peak holiday web traffic analysis and lessons learned
    Internet Retailer
    January 28, 2019

    Predicting and preparing for peak traffic volume and resource demands is a difficult task for online retailers around the world. They need to be ready for both expected and unexpected traffic spikes at any time. No one wants the CEO on their doorstep asking why their website is down and losing revenue every second it remains offline.

    In this post, we’ll review key web performance insights that Akamai saw globally in the 2018 holiday shopping season, including:

    • The continued rise of mobile
    • Who the mobile customer is
    • Conversion and bounce rates
    Byline article by Akamai Director of Industry Marketing Chris Wraight.

    Read Full Story
  • Tune up your TV for Super Bowl Sunday
    Tech It Out
    January 26, 2019

    [Audio] What to look for in a new TV and tune-up tips ahead of Super Bowl Sunday, with Akamai’s Peter Chave.

    Akamai segment begins at 26:34.

    Read Full Story
  • Want Better Customer Relationships? Walk A Mile In Their Shoes
    MediaPost
    January 25, 2019

    There’s no denying that satisfied customers are key to the health of any business. It’s important for business leaders to ensure that they’re not only meeting, but exceeding, customer expectations.

    And one of the most important steps any company can take to better serve its client base is to get inside the head of these key stakeholders to understand their business needs and challenges.

    My company helps deliver online video content for streaming providers, broadcasters, and social media sites and for live events. To demonstrate our solutions onsite in a live environment, we created and streamed a live online broadcast program from the show floor of IBC, the annual broadcast technology conference in Amsterdam.

    The project was no small undertaking, but our biggest triumph were the lessons we learned from spending a couple days in our customers’ shoes.

    Byline article by Akamai Principal Architect Peter Chave.

    Read Full Story
  • Fighting Fire with Fire: API Automation Risks
    ThreatPost
    January 24, 2019

    Akamai research shows that 83 percent of all traffic on the web today are API calls (JSON / XML). In many cases this fast growth can be attributed to the adoption and popularity of mobile devices and the mobile app ecosystem, as well as the abuse by threat actors using bots to automate their manual attack processes. It’s been established that attackers are targeting public facing API’s that can be easily discovered, but there’s a whole other attack surface that’s getting little attention.

    In this article, I’ll discuss API attack trends, the current (and failing) architectural designs for addressing security of these API transactions, attacker techniques, as well as common tools that can be used to identify your own attack surface and deploy the appropriate defenses.

    Byline article by Akamai Senior Manager of Security Technology & Strategy Tony Lauro.

    Read Full Story
  • M&A wrap: Akamai, Janrain, LLR, Thoma Bravo, Wind Point
    Merger&Acquisitions
    January 24, 2019

    Akamai Technologies (Nasdaq: AKAM) has acquired cybersecurity provider Janrain. The target helps protect businesses from cyberattacks by securing their websites and digital presence. "Adding identity management to the Akamai Edge will provide an added layer of security for our customers," says Akamai CEO Tom Leighton (pictured). "With our acquisition now complete, we can work towards providing them with a sophisticated identity management solution, enabling trusted digital experiences for their end users." As companies continue to adopt cloud technologies and digitize their businesses, web security and identity awareness have become increasingly critical to keeping businesses secure. Demand for new and improved offerings has created a healthy appetite for M&A with cybersecurity-related companies. LLR Partners invested in PhishLabs; Thoma Bravo-backed Centrify; and Zix Corp. (Nasdaq: ZIXI) is buying AppRiver from Marlin Equity Partners.

    Read Full Story
  • Will people ditch cash for cryptocurrency? Japan is about to find out
    MIT Technology Review
    January 22, 2019

    Mitsubishi UFJ Financial Group (MUFG), the country’s largest bank and the fifth largest in the world by total assets, has teamed with American internet company Akamai to build a blockchain-based consumer payment network in time for the Olympics. If they pull it off, it could be the fastest and most powerful consumer payment network to date. They claim that in tests it’s been able to handle more than a million transactions per second, with each transaction confirmed in two seconds or less, and say it could eventually achieve 10 million transactions per second. (Visa’s credit card network, by comparison, handles several thousand transactions per second. Bitcoin tops out at about seven transactions per second, and each transaction can take up to an hour to confirm.) The system is designed to handle all kinds of payments, from automated highway tolls to payment-card swipes to in-app purchases.

    Read Full Story
  • Why traffic to retail websites was quiet on Christmas but picked up on Boxing Day
    Internet Retailer
    January 22, 2019

    As we have seen throughout the recent global peak traffic holiday period, online retailers need to be prepared to offer optimal customer experiences to mobile visitors (including mobile app and web browser interaction) as their overall usage is greater than desktop users and their use has gone beyond research and includes purchasing.

    Until now, significant time and budget have been invested optimizing web applications and content for desktop visitors. This focus should not diminish but, as we saw, the percentage of mobile visitors exceeded desktop visitors during ALL of the major holiday events, with no sign of reversing in 2019. This trend underscores the importance of prioritizing an optimal mobile customer experience, but not at the expense of desktop optimization.

    Byline article by Akamai Director of Industry Marketing Chris Wraight.

    Read Full Story
  • Stations Have Growing Options For Local OTT
    TVNewsCheck
    January 17, 2019

    Akamai’s Media Services Live helps content providers ingest and prepare their live streams for a smooth viewing experience. Net Storage is a globally distributed, cloud-based storage solution that caches content as close to viewers as possible.

    Akamai also addresses security. It is no longer just about digital rights management and secure TV Everywhere authentication, he says.

    “The bad guys have noticed OTT because they see money there,” Keats says. The combination of personal information and credit card info tied to subscription or transactional services makes an attractive target, he says.

    Read Full Story
  • New Attacks Target Recent PHP Framework Vulnerability
    Dark Reading
    January 17, 2019

    Last month a code execution vulnerability was found in the ThinkPHP framework, a rapid-development framework developed by Chinese firm TopThink. While the vulnerability, designated CVE-2018-20062, was patched by the developer, a researcher has now found active exploits of the vulnerability in the wild.

    Larry Cashdollar, a vulnerability researcher and member of Akamai's Security Incident Response Team, was doing research on a recent Magecart attack targeting extensions to the Magento e-commerce platform when he noticed a malware request he hadn't seen before – a request to ThinkPHP.

    “I realized there was a software framework developed in China that had this vulnerability, and it was being taken advantage of to install coin miners and skimmers,” Cashdollar says. “They [also] were using it to install any kind of payload targeting Windows machines, IoT devices, or to mine Bitcoin or Monero coins.”

    Read Full Story
  • The Best Employers For Diversity 2019
    Forbes
    January 15, 2019

    Forbes partnered with market research company Statista to create our second annual ranking of America’s best employers for diversity . The list was compiled by surveying 50,000 Americans working for businesses with at least 1,000 employees, and it features some businesses whose appearance on the list, in light of recent events, may come as a surprise.

    #318 Akamai Technologies
    Akamai Technologies, Inc. provides cloud services for delivering, optimizing and securing online content and business applications. Its solutions include delivery of conventional content on websites to tools that support the delivery and operation of cloud-based applications, as well as security solutions and live and on-demand streaming video capabilities. The company was founded by Frank Thomson Leighton, Jonathan Seelig, Randall Kaplan and Daniel Mark Lewin on August 20, 1998 and is headquartered in Cambridge, MA.

    Read Full Story
  • Q&A: Patrick Sullivan on Using Zero-Trust Networks to Boost Higher Ed Cybersecurity
    EdTech Magazine
    January 10, 2019

    The education sector was particularly vulnerable to cyberattacks last year, a study found in mid-December , and security experts are concerned that 2019 will bring a new round of threats that are more sophisticated than ever.

    “No industry or institution is immune from cyberattacks, not even Harvard,” says Akamai global director Patrick Sullivan. “Thousands of students — often from all over the world — access the internet at colleges and universities, and bring any vulnerabilities or malware their computers pick up off-campus with them.”

    EdTech spoke with Sullivan about how a new network access structure may help universities better guarantee the privacy and protection of network users on campus.

    Read Full Story
  • Building Amazing Apps, Part 1: Optimizing the Front End
    DevOps.com
    January 9, 2019

    There are millions of apps available today, and it’s incredibly easy for any user to download and install any of them with just a few taps on a screen or click of a mouse. If you want to build and deliver an app that will amaze users, you need to be able to differentiate from the rest of the pack.

    Over the past 14 years, I’ve been working closely with the top companies delivering the most popular apps, helping them optimize their apps for speed and scale so users get a great experience. In this three-part series, we’ll explore the fundamental steps you must take to build and deliver your own amazing app at scale that will keep users coming back for more.

    Byline article by Akamai Developer Evangelist Javier Garza

    Read Full Story
  • Akamai acquires Janrain to strengthen identity access controls, bot protection
    ZDNet
    January 8, 2019

    Akamai has acquired Janrain in a bid to improve security access controls and identity management.

    On Monday, John Summers, Akamai VP & CTO announced the purchase, which is designed to improve Akamai's position in "securing against expanding threats while also enabling superior web experiences."

    Read Full Story
  • Identify as Security Key: Akamai Buys Online Access Firm Janrain
    Xconomy
    January 8, 2019

    Logins, passwords, security questions, and dual authentications all try to tackle the identity issue that centers on whether a website can trust that a user is who they say they are and—from the other side—whether a user can trust their account is opened up to them and only them.

    It’s also the reason why Cambridge, MA-based Akamai Technologies (NASDAQ: AKAM), a provider of Internet content delivery network services and cybersecurity technologies, plunked down an undisclosed sum to buy Portland, OR-based online identity management company Janrain.

    “Identity is a key component to be able to mitigate both the current generation of attacks and the general going forward,” says John Summers, Akamai chief technology officer. “Linking the digital identity to real work identity is a direction the industry needs to go.”

    Read Full Story
  • Business-critical IoT “Platform” to Become the New Black
    VM Blog
    January 8, 2019

    In 2019, IoT is poised to transform businesses and as industry itself, providing increasingly valuable connected data to the enterprise, making strides to fill security gaps within the development process and seeing increasing investments in IoT platforms.

    Akamai CTO of IoT and Mobile Lior Netzer shares more on how he expects these trends will unfold in the year ahead.

    IoT data will become a business-critical resource in 2019. As the enterprise increasingly adopts IoT devices and sensors, the volume of data generated by these devices and sensors increases too, providing a trove of valuable insights. At the same time, machine learning and artificial intelligence-driven data analytics will continue to mature, meaning IoT data analysis will become easier. Through a collaborative and multidisciplinary effort, businesses will be able to glean deeper insight from their connected data, (such as cross-correlating inputs from discrete sensors for better decision making,) ultimately leading to smarter business decisions.

    Read Full Story
  • Why Akamai Agreed to Acquire Janrain
    Bloomberg TV
    January 7, 2019

    Tom Leighton, Akamai chief executive officer, discusses the company's acquisition of Janrain and the demand for cybersecurity software with Bloomberg's Caroline Hyde, Joe Weisenthal and Romaine Bostick on “Bloomberg Markets: What'd You Miss?”

    Read Full Story
  • Data management in 2019
    Federal News Network
    January 7, 2019

    Most listeners know about Akamai because of its decades-long reputation for improving speed of delivery of Internet services world-wide. Well, today’s Akamai has taken advantage of its position as a leader in cyber security as well.

    It makes sense — if your foundation is understanding network traffic, you can build on that expertise to control malicious traffic as well.

    This week on Federal Tech Talk , Patrick Sullivan, director of Security Technology and Strategy at Akamai , talked about Zero Trust, bots, bot networks, software defined networks and . . . whew . . . security operations centers.

    Read Full Story
  • Predictions for 2019: Viewers will have to wait to see wide-reaching 5G impact
    SVG Europe
    January 3, 2019

    If you listen to any current presentation relating to 5G and broadcasting, you will be excused if you come away feeling less than enthused. Over the last few years, 2019 was hailed by many to be a big year for mobile connectivity and video delivery as 5G services began to roll out.

    The argument was clear, as 5G develops, so too does the ability to deliver higher-quality video, both to mobile devices and to viewers who are ‘off the grid’ for fixed broadband connectivity. Many have even proffered that the future of linear broadcasting will be determined by 3GPP.

    But, as we dig under the skin of the promise, we can see that serious adoption of 5G services for linear delivery won’t happen until after 2023 at a minimum. We can predict however that 2019 will see more trials and a better understanding of what the technology can really bring to the table.

    Read Full Story
  • Hackers Hijack Chromecast Devices and Smart TVs via Exposed UPnP
    Security Boulevard
    January 3, 2019

    The CastHack code has been released on GitHub, so other attackers can now hijack exposed devices, potentially for malicious reasons such as displaying scareware/ransomware notes or other types of scams.

    Also, the risk posed by insecure UPnP implementations is much greater than rogue messages on people’s TVs. In November, researchers from Akamai warned that hackers are exploiting UPnP in routers to attack LAN computers over SMB. The same technique, called UPnProxy, was used in the past to proxy malicious traffic through people’s routers.

    According to Akamai, there are an estimated 3.5 million devices that expose their UPnP endpoints to the internet and 277,000 of them are vulnerable to UPnProxy attacks.

    Read Full Story
  • Zero trust pushes agencies away from an outdated approach to cybersecurity
    Federal News Network
    January 1, 2019

    With the ever-growing list of devices connected to your agency’s network, the emergence of operational technology (OT), not just information technology (IT) as a cyber threat, and wide acceptance of cloud computing, enabling a zero trust network is not only possible, but absolutely necessary.

    Randy Wood, vice president of U.S. public sector sales for Akamai, said zero trust is not a new idea, but one that is about five years old. It promotes the simple concept that trust is not an attribute of location, and just because an employee is trusted inside perimeter, it doesn’t mean he or she should be granted access to all the information.

    “We are operating under an outdated paradigm that the network and perimeter have traditionally defined the boundaries of security. But we know the way the government is working today in a cloud, hybrid and on-premise fashion, that model doesn’t work,” Wood said on the Innovation in Government show. “Zero trust is the idea of trusting no one, no device and no application. It also requires authenticating and authorizing absolutely everyone independent of where they are and what device they have.”

    Read Full Story
  • Industry captains place big bets on new-age tech
    LiveMint
    January 1, 2019

    Mint asked top company bosses how they see disruptive technologies such as artificial intelligence, blockchain and 5G impacting Indian firms.

    Prasad Mandava, MD (India) and VP (Engineering), Akamai
    Thoughts on AI (Machine Learning, Deep Learning), Blockchain, IoT, AR-VR, 3D Printing, Automation and Robotics.

    All these technologies hold promise in time to come. At Akamai, we’re thinking ahead to 2020 in fact. In the area of blockchain for example, we entered into a partnership with MUFG, one of the world’s leading financial groups, to offer a new blockchain-based online payment network enabling next-generation payment transaction scale and responsiveness. This hyper-scale payment network, powered by an innovative and newly-developed blockchain architecture, is designed to be capable of processing more than one million transactions per second at latencies of less than two seconds per transaction. The underlying blockchain architecture is expected to be extensible to 10 million transactions per second. MUFG and Akamai intend to leverage the technology, built and deployed on the Akamai Intelligent Platform, to offer a new payment network expected to be available in Japan during the first half of 2020.

    Read Full Story

View Previous Stories