In The News

The latest articles, blog posts and newscasts mentioning Akamai

  • It will take more than web pages that load faster to boost holiday conversion
    Internet Retailer
    October 4, 2018

    Many online commerce providers have invested significant time, money and effort to optimize their websites and apps to drive down bounce rates and to entice visitors by focusing on speeding up page load times. Yet optimizing your site for a superior customer experience (CX) to attract and convert visitors into paying customers doesn’t just mean fixing the slowest pages. Very often, web pages consist of a variety of elements and content that can come from different sources. There are a lot of other factors and environments, such as mobile devices, that must be considered when improving the CX to increase sales.

    Read Full Story
  • CMAF is coming and it could dramatically improve livestreaming
    FierceVideo
    October 2, 2018

    Latency levels in livestreaming have improved over the past few years, but as audiences for livestreamed content grow, so too does demand for even lower latency. That’s where CMAF comes in.

    Jon Alexander, senior director of product management at Akamai Technologies, said CMAF allows for chunk transfer. That means that the video segment is still being created by the encoder as it is being played by the player. So, the player has to be configured to start rendering the video before it has even received the entire file.

    Read Full Story
  • Akamai Co-Founder Dr. Tom Leighton Wins 2018 Marconi Prize
    Cineca News
    October 3, 2018

    Dr. Frank Thomson “Tom” Leighton, who developed the algorithms now used to deliver trillions of content requests over the Internet every day, has been awarded with the 2018 Marconi Prize, during The Marconi Society’s annual Awards Dinner in Bologna, Italy, on October 2.

    The Marconi Society, dedicated to furthering scientific achievements in communications and the Internet, is honoring Leighton for his fundamental contributions to technology and the establishment of the content delivery network (CDN) industry.

    “Dr. Leighton is the embodiment of what the Marconi Prize honors,” says Vint Cerf, Marconi Society Chairman and Chief Internet Evangelist at Google. “He and his research partner, Danny Lewin, tackled one of the major problems limiting the power of the Internet, and when they developed the solution, they founded Akamai – now one of the premier technology companies in the world – to bring it to market. This story is truly remarkable.”

    Read Full Story
  • CDN as an SEO Tool: Increasing Load Speed to Maximize Performance
    DZone
    October 1, 2018

    User expectations for websites have moved beyond just speed and availability. Each unique user’s experience starts before they even hit your page. They want a full and rich experience and search engine algorithms are a big factor in supporting their journey.

    The complexity of search engines has increased well beyond simply looking for keywords to an intelligent system that finds and ranks the sites the user wants, even if individuals don’t know it themselves. Algorithm upgrades that can penalize excessive use of keywords, reward external citations and promote multimedia content have improved the accessibility of the right web content, for the right user immensely. The latest of these search algorithm improvements take more into consideration than just page content. Factors that depend on site infrastructure—such as website speed, especially when it comes to mobile sites—are now major elements.

    Read Full Story
  • Credential Stuffing Attacks Are Reaching DDoS Proportions
    SecurityWeek
    September 24, 2018

    Financial and retail sectors are the most targeted simply because that's where the online money is to be found. In its 'State of the Internet/security -- Credential Stuffing Attacks' report (PDF), Akamai focuses on the experiences of just two financial sector customers. The first is a very large financial services institution, while the second is a much smaller credit union bank.

    "Credential Stuffing is growing fast," Rich Bolstridge, chief strategist for financial services at Akamai Technologies, told SecurityWeek. "In March and April 2018 we logged over 6 billion malicious login attempts. By May and June, this had risen to more than 8 billion attempts."

    Read Full Story
  • IBC 2018 Reflections: Akamai’s Joachim Hengge Dissects the Company’s New Solutions That Bolster Cloud Connectivity and Delivery
    Sports Video Group
    September 24, 2018

    For some time now, Akamai Technologies has reigned as one of the top video-delivery–solutions providers in the global media industry. At the recent IBC Show in Amsterdam, the company made a couple of big product announcements (not something it does every day!) that are expected to help take its delivery services into a new stratosphere of efficiency and cost-effectiveness in a media industry rapidly moving many centralized workflows into a cloud environment.

    In response to that evolution, Akamai unveiled Akamai Cloud Wrapper and Akamai Direct Connect, both intended to help make the company’s elite delivery service more customizable, flexible, and useful in a new cloud-based world.

    Read Full Story
  • How Akamai Is Bringing Online Video Streaming Closer to Television Broadcast
    Gadgets360
    September 17, 2018

    With the arrival of faster Internet speeds, online video consumption has reached new levels in India, with OTT (over-the-top) video platforms such as Amazon Prime Video, Hotstar, and Netflix bringing new content to attract Indian viewers. At the same time, leading content delivery network Akamai - which has more than 240,000 servers spread across over 130 countries worldwide - is building new solutions to enhance end user experiences while helping keep content providers keep their costs in check. Gadgets 360 caught up with Parimal Pandya, Vice President, Media - APJ, Akamai Technologies to find out more about the latest developments at the company.

    Read Full Story
  • Credential stuffing attacks cause heartache for the financial sector
    ZDNet
    September 19, 2018

    According to cybersecurity firm Akamai's 2018 State of the Internet report, organizations in the financial sector must also be wary of a new trend -- the increasing popularity of credential stuffing attacks.

    Often utilized by botnets, credential stuffing describes the use of stolen or leaked credentials in automatic injection attacks. Automated scripts hammer online services with credentials in the hopes of a password and username or email address being accepted as legitimate -- which, in turn, permits account hijacking and takeovers.

    Read Full Story
  • Akamai unveils two new solutions to solve streaming TV challenges of broadcasters
    ETtech
    September 17, 2018

    Cloud delivery platform Akamai has introduced two new solutions for television broadcasters and distributors to address challenges with cloud computing and ensuring high-quality delivery to the Akamai network.

    Akamai Cloud Wrapper caches content from the cloud within Akamai’s delivery network and optimizes the connectivity between public cloud infrastructures and its Intelligence Edge platform to eliminate the common roadblocks faced during the delivery of streaming content in cloud environments and reduce cloud delivery costs.

    Read Full Story
  • AI is the unsung hero of the metadata generation: Peter Chave of Akamai
    BroadcastPro ME
    September 9th, 2018

    One of the most valuable commodities today is viewer attention. From broadcasters to advertisers, everyone with a message is competing for it. In a world already saturated with content, how do you stand apart from the rest?

    Broadcasters are now beginning to realise how much value their data has. Metadata can be harnessed not only to lead viewers to content, but also to enable content owners to reach their target audiences. By offering a platform for content owners to connect to the right audience at the right time, metadata can improve both visibility and customer satisfaction. If metadata is managed properly, the content presented and described will be more consistent and the AI-driven recommended content to viewers will more accurately reflect their individual interests. But where does this data come from?

    Read Full Story
  • How Can Media Companies Be More Confident in Their Cybersecurity Strategy and Policy?
    Security Intelligent
    September 11, 2018

    While many industries have matured their cybersecurity strategy and policy as the digital landscape has evolved, others — such as media companies — remain unsure how to advance.

    With more consumers relying on the internet for their entertainment and information consumption, media enterprises are tasked with providing a flawless user experience and continuous content delivery. But the industry is prey to a growing number of predators. As a result, a recent Akamai study titled “The State of Media Security” found that only 1 percent of media companies are “very confident” with their cybersecurity efforts.

    Read Full Story
  • How Scalability Planning Results Markedly Improves APIs
    ProgrammableWeb
    September 7, 2018

    Many APIs have some core functions that are unique to them, but often these APIs are equipped with commonly used administrative functions. While this may have its pluses, API developers need the freedom to focus on the functionality of their APIs instead of worrying about the more common administrative aspects like authentication and authorization (AuthN/AuthZ).

    Read Full Story
  • Five Ways IoT Projects can Power your 2019 IT Budget Planning
    ZDNet
    September 4, 2018

    The Internet of Things (IoT) is an essential part of enterprise IT infrastructure, so it's only natural to include IoT projects when planning budgets for 2019. The most prevalent use case for manufacturing is asset management, according to Ari Weil, vice president of product marketing for Akamai. "By utilizing IoT data, businesses can better predict when machines need maintenance or how adjustments will impact the production run. Managing asset maintenance, dynamically adjusting production runs, reporting for compliance can be automated and reduce downtime, improve product delivery timelines and reduce operational costs."

    Read Full Story
  • Cybersecurity and the future of work: How much can we predict?
    Silicon Republic
    September 6, 2018

    The phrase ‘future of work’ conjures up an image of a slick, highly technical working environment that seems decades down the line. The reality is, the future of work is developing under our noses at a rapid pace.

    This emphasis on zero trust is echoed by Bernd Koenig, director of security products at Akamai. “To protect against these threats, organisations must adopt a zero-trust approach to security, assuming no request to access networks, apps or data should be automatically trusted, no matter where it comes from, and requiring every attempt to be authenticated before access can be granted.”

    Read Full Story
  • “Immature” APAC businesses losing customers, up to $28.5m annually to credential stuffing
    CSO Australia
    August 31, 2018

    Cybercriminals’ use of cross-matching techniques and credential-stuffing bots is creating headaches for CISOs and costing Asia-Pacific organisations up to $28.5 million per year, according to new figures from Akamai that also suggest the average company suffers 12 credential-stuffing attacks each month.

    Credential stuffing – when cybercriminals use stolen user credentials to access other services where those users have used the same credentials – had caught “immature” e-commerce brands unawares because their cybersecurity efforts to date have prioritised the protection of payment-card data, Ari Weil, Vice President of Product Marketing, Akamai told CSO Australia.

    “These brands have been very mature when it comes to web and mobile performance,” he said, “but they are immature from a security perspective. The only thing they’ve had to worry about in the past have been things like PCI DSS , so they can handle credit-card data.”

    Read Full Story
  • Edge computing will be a hot topic during IBC 2018
    FierceVideo
    August 30, 2018

    As 5G networks inch closer to reality and next-generation video technology like VR and 8K threaten to stretch the limits of streaming, edge computing will become a hot topic.

    Akamai Technologies, which will be onsite during IBC, is betting on edge computing becoming more necessary as video traffic continues to rise. Akamai Tom Leighton recently told CNBC’s “Squawk Box” that edge computing is basically an extension of what the cloud can currently offer and may provide more security.

    “[Edge computing] is what you need to interact with to get your video, to do your transaction quickly and to do things securely. We’re in a situation today where these large entities have co-opted a lot of devices out there and they can flood the core with traffic. It’s so bad today you can actually flood countries,” Leighton said.

    Read Full Story
  • Mobile matters: how to ready your apps for the holiday shopping spike
    Internet Retailer
    August 30, 2018

    The cheer and good spirits of the holiday shopping season carefully conceal the real competition raging between retailers behind the scenes. Only the brands that focus on mobile will survive as Forrester’s 2018 Retail Best Practices: Mobile Web study found that smartphones will be used in over one-third of total U.S. retail sales at some point in the buying process this year.

    Even computer- and browser-based shopping are slowly making way for mobile devices. The recent State of Online Retail report from Akamai found that brands need to focus on mobile apps in particular, as consumer preference for the convenience of mobile has had a significant impact on revenue. On Black Friday 2017, mobile devices accounted for more than 50 percent of retail traffic seen by Akamai. These devices not only drove more traffic but also showed a greater increase in conversion rates from the previous year, up 71 percent while desktop and tablet rates remained flat.

    Read Full Story
  • Free Cybersecurity Services Offer a First Step to Securing US Elections
    Dark Reading
    August 28, 2018

    While the wave of gratis security services from the security industry this election year are a welcome assist, it's just a first step in updating and tightening security of election systems. There realistically won't be any major improvements in security until at least 2020, experts say.

    "You can make meaningful change in two years" before the 2020 presidential election, notes Patrick Sullivan, director of security strategy at Akamai. "A lot of that is ... leveraging cloud services is easier than" replacing on-site security infrastructure, he notes.

    Read Full Story
  • Girls learn to code with no fear
    The Boston Herald
    August 23, 2018

    The Girls Who Code program, hosted by Akamai for the past four years, is designed to encourage more girls to pursue computer science, technology, math and science as career options to fill a growing gender gap in the tech field. A graduation ceremony for the students is planned today on the company’s Cambridge campus.

    “We view diversity as a gateway to innovation,” said Anthony Williams, Akamai vice president of talent acquisition and diversity. “Akamai was founded based on solving difficult technical problems. Inclusion of different experiences, cultures, and backgrounds come together to help us come up with the best solutions to problems on the internet.”

    Read Full Story
  • Best Practices for Premium Video Streaming, Part 3: Content Delivery
    Streaming Media
    August 22, 2018

    Consumers expect the same or better experience from their premium online video service as they receive from traditional TV services. It is not enough to deliver exceptional service if it can't be sustained consistently for each viewer. The bar on performance and consistency for streaming live and on-demand video requires that online content providers get the most out of their content delivery network (CDN) partner(s).

    In this Part Three of “Best Practices for Premium Video Streaming,” we’ll explore key requirements to ensure CDN performance meets the growing expectations of broadcast-scale audiences.

    Read Full Story
  • Akamai sees the big picture on video platforms
    Economic Times
    August 20, 2018

    Akamai, one of the largest content delivery networks in the world, is looking to help video platforms reduce the unpredictability of the internet infrastructure through its suite of recently-launched media products.

    Sidharth Pisharoti, Akamai's regional vice-president for media in Asia Pacific and Japan, told ETtech they are currently testing products like predictive content delivery and media acceleration with select content providers in the country, but declined to disclose specific names.

    Akamai is investing heavily into its R&D efforts to build such products, especially in the video segment that has been one of the biggest drivers of traffic and revenues for the tech giant.

    Read Full Story
  • The Future Is Moving To The Edge
    NASDAQ
    August 20, 2018

    The company we founded 20 years ago today, Akamai ( AKAM ), pioneered the notion of an Edge Platform with servers delivering and securing web content, video, and mobile apps for users all over the world. For most of the last 20 years, skeptics abounded, but now it is generally accepted that the edge has never been more important to the future.

    Our NASDAQ-listed company has come a long way from our humble beginnings in 1998. We've grown well beyond our origins as the market's leading content delivery network into the world's intelligent edge platform. In spite of how remarkably the Internet has grown and evolved over the past 20 years, we believe the most dramatic digital experiences are yet to come, as we enable a connected world of unimagined potential through the power of the Akamai Edge.

    Read Full Story
  • Black Hat and Defcon cybersecurity experts share tips on how to protect yourself
    CNET
    August 17, 2018

    During the week of Black Hat and Defcon, tens of thousands of security experts and hackers flock to Las Vegas for the back-to-back conferences. They hold discussions on issues like smart cities getting hacked, two-factor authentication, and security issues with voice assistants.

    It can all get a little technical. But with so much cybersecurity knowledge in one place, I decided to ask individual experts for a single useful cybersecurity tip for the average person.

    Patrick Sullivan, director of security at Akamai
    If you have to use a password, and you're not using something like a multifactor solution, take a look at a password manager. That makes it pretty easy to log in to sites and have a variety of passwords.

    Read Full Story
  • UDP-Based Streaming Modes Battle For Traction as Paths to Low Latency
    Screen Plays
    August 10, 2018

    For the folks running streaming operations, tracking the constantly changing nuances and relative merits of an alphabet soup’s worth of open-source innovations like SRT, QUIC, WebRTC and CMAF is an especially irritating distraction from day-to-day execution of tasks at hand. But getting it right is fast becoming an existential challenge.

    Last year Akamai became the first CDN operator to announce support for QUIC, which is now part of the Media Acceleration and Efficiency platform. Akamai offers QUIC on access routes from the CDN edge to a load-dependent subset of end user devices running compatible client software, such as Chrome browsers.

    “This can be applied to any video stream utilizing Akamai’s Media Acceleration and Efficiency platform, whether or not QUIC is used for ingress,” notes Will Law, chief architect for Akamai’s media division. ABR-streamed video on the Akamai CDN can be delivered from the edge locations over TCP or UDP using QUIC, depending on client support and edge server load, Law says.

    Read Full Story
  • The holiday shopping surge is going global: How to keep up (and cash in)
    Internet Retailer
    August 9, 2018

    If the 2017 $691.9-billion holiday shopping season is any indicator of what to expect this year, online retailers will have more opportunity than ever to increase sales and grow their customer bases. During this make-or-break shopping season, businesses can earn up to 30 percent of their annual revenue, according to the NRF. Critical to seizing the opportunity that holiday shopping surges bring is understanding not only who your potential customers are, but where they are.

    According to Akamai’s State of Online Retail Performance report, Black Friday and Cyber Monday 2017 were not just popular holidays for online shopping in the United States, but also internationally. On those two days in 2017, website conversion rate increases were common and significantly higher than the previous year across the U.K., Germany, France, Spain and other countries outside the U.S. In the U.K., for example, year-over-year conversion rates soared with a 42-percent increase on Black Friday and 35-percent increase on Cyber Monday compared to those same shopping days the prior year.

    Read Full Story
  • Intensifying DDoS attacks: Choosing your defensive strategy
    HelpNet Security
    August 6, 2018

    One of the biggest misconception regarding DDoS attacks is that they are a once-in-a-lifetime event for organizations, says Josh Shaul, VP of Web Security at Akamai.

    “Over the last six months, our State of the Internet Report found that companies suffered 41 DDoS attacks on average over the last six months,” he points out.

    “The agility and resources brought to bear by the cybercriminals can cause a major headache for an organization – of the scale and speed at which these attacks take place. For example, the sheer scale of the Mirai botnet attack in late 2016 may have taken an entire country off the internet at one point,” Shaul notes.

    Read Full Story
  • Akamai API Gateway demonstrates importance of DevOps
    Intelligent CIO
    July 31, 2018

    “The Akamai API Gateway brings together Akamai’s DevOps solutions with a holistic and highly effective approach to delivering, securing, and governing the use of APIs on our platform. We believe the result is an-industry best approach for connecting DevOps, API management, and the delivery of web experiences.”

    Akamai brings its API Gateway to the edge for easier governance, monitoring and scale of APIs that are critical to enabling new business models. The Gateway frees up time spent on managing and maintaining published APIs, allowing developers to focus on API strategy, design and implementation with increased agility.

    Read Full Story
  • Build a Foundation for World-Class OTT Delivery
    The Broadcast Bridge
    July 23, 2018

    One of the first and most critical steps in the streaming delivery journey is IP transport. The primary goals need to be latency minimization and avoiding quality degradation.

    Advancements in HTTP/2, which became a published standard in 2015, allow providers to skip a step with the transcoders by delivering content to the origin servers following transmission control protocol (TCP)-based streaming techniques. But TCP does have some trade-offs, sacrificing low latency for high reliability, especially the further the signal has to travel.

    Read Full Story
  • Scraper Bots and the Secret Internet Arms Race
    WIRED
    July 23, 2018

    For retailers, scraping can be a two-way street, and that’s where things get interesting. Retailers want to see what their rivals are doing, but they want to prevent rivals from snooping on them; retailers also want to protect intellectual property like product photos and descriptions, which can be scraped and reused without permission by others. So many deploy defenses to subvert scraping, says Josh Shaul, vice president of web security at Akamai Technologies. One technique: showing different prices to real people than to bots. A site may show the price as astronomically high or zero to throw off bots collecting data.

    Read Full Story
  • World Cup wrap-up: streaming records tumble across the board
    nScreen Media
    July 22, 2018

    The World Cup was the most streamed event in Akamai Technologies history, driving a greater volume of data in 11 days than the entire Rio Olympics in 2016. The highest traffic peak was reached not in the final, but the semi-final between France and Belgium. The game reached a peak of 22.52 Tbps, exceeding the final’s peak of 20.66 Tbps and the peak of 6.88 Tbps set in the Brazil World Cup.

    Read Full Story
  • How A Zero Trust Model Can Help Agencies Evolve Against Digital Threats
    Federal Times
    July 20, 2018

    As digital transformation drives modernization (and increases the attack surface area), agency infrastructures are starting to evolve to protect against DDoS attacks impacting elections, health care systems and other critical infrastructure.

    Government agencies are putting new cybersecurity plans in motion. For instance, in May, the Department of Defense released a new policy memo in an effort to restrict personal mobile devices inside secure areas of the Pentagon. That same month, the State Department released a report outlining new goals across the federal government aimed at improving cybersecurity. The Election Assistance Commission also revised the Voluntary Voter System Guidelines to combat growing digital threats. Even more recently, the Pentagon announced it is seeking a game-changing solution to thwart nation states from breaching DoD’s network — a desperately needed solution to combat the more aggressive attacks that threaten today’s critical infrastructure.

    Read Full Story
  • Building a Strong Network for Websites
    Network Computing
    July 19, 2018

    The good news is, thanks to technological advancements, developing a reliable website has become much easier in recent years thanks to improved development methodologies. However, if you do not have a reliable network in place to build the website on top of, no matter which technologies or methodologies you deploy, you are most likely just throwing good money away. Much like a house needs a strong foundation so that people can have a reliable and secure home to live in, websites need a good network to make sure that end users can access the website reliably and securely.

    Read Full Story
  • The Router of All Evil
    CSO Syn City
    July 19, 2018

    The biggest problem with connected devices is that the criteria for a good IoT device doesn’t necessarily include security. An IoT camera needs to have good resolution and zoom capability. An IoT refrigerator needs to keep food cold and run quietly. A router needs to move packets to the correct devices on the local network. Very few consumers are knowledgeable, or care enough, to ask about the security around these devices. Are there hardcoded passwords? How long are firmware updates available? What happens when the device goes out of support?

    All these are questions that the nascent IoT industry needs to start giving a lot of thought to, otherwise consumer protection agencies will. And they will lay down regulations to ensure safety, both of consumers and the internet at large.

    Read Full Story
  • DDoS Attacks Get Bigger, Smarter, More Diverse
    Threatpost
    July 17, 2018

    DDoS attacks are relentless. New techniques, new targets and a new class of attackers continue to reinvigorate one of the internet’s oldest nemeses.

    Distributed denial of service attacks, bent on taking websites offline by overwhelming domains or specific application infrastructure with massive traffic flows, continue to pose a major challenge to businesses of all stripes. Being knocked offline impacts revenue, customer service and basic business functions – and worryingly, the bad actors behind these attacks are honing their approaches to become ever more successful over time.

    Read Full Story
  • Phone is the right hand? You’re a hacker!
    BBC
    July 13, 2018

    Hackers are finding it too easy to circumvent traditional cyber defences, forcing businesses to rethink their security strategies. Many firms are now harnessing big data and adopting cutting edge verification checks. In fact, some can even identify you by how quickly you type your computer keys, or how you hold your mobile phone.

    In these days of regular space travel, nanotechnology and quantum computers it is easy to believe we live in an age plucked from the pages of a science-fiction novel.

    Many approach cyber-security like a medieval king would have tackled domestic security - by building a castle to protect themselves, says Dr Robert Blumofe, a senior manager at cloud services firm Akamai.

    Read Full Story
  • Best Practice for Application Security Testing in the Era of DevOps and AI
    DevOps.com
    July 12, 2018

    Application security testing is no easy feat. And yet, it’s usually the first topic that most articles about application security address. The reasons are simple: As the pace of application development techniques (and their inevitable vulnerabilities) evolve, AppSec personnel have found themselves caught between the desire to keep pace with their management of security testing requirements and their ability to allow the developer teams to operate in the modern, fast-paced ecosystem of DevOps and artificial intelligence.

    Read Full Story
  • ‘Consistent Experience’ Is Key To Combining OTT, Linear TV
    TV Technology
    July 10, 2018

    Jon Alexander, senior director of product management for Akamai, noted the special considerations for live vs. on-demand.

    “For live and linear delivery, we emphasize live origin capabilities—ingesting video into our network from as close to the origination point [ideally production or playout] as quickly as possible,” Alexander said, noting that for on-demand content, Akamai seeks to move content “into our storage environment or from a customer’s on-premise or cloud storage platform.

    Read Full Story
  • Chief Digital Officers Can Help End the Marketing-Web Team Tug of War
    CMSWire
    July 06, 2018

    Web teams and digital marketers both have the same overarching goal: providing great customer experiences. Despite this alignment, many of today’s digital businesses can find these teams at odds with one another.

    The root of the problem is that each team measures success in different ways. While marketing teams tend to think in terms of conversion rates and sales, web teams tend to think in terms of improving page load times and avoiding site slowdowns. The truth is a successful online business needs both.

    Read Full Story
  • FIFA World Cup Russia 2018 sees record online viewing figures
    Forbes
    July 05, 2018

    Cloud delivery platform Akamai reports that viewers of the first round of Russia 2018 streamed 65% more data over the Akamai Intelligent Platform than they did during the whole of the Rio World Cup just four years earlier. The number of streams running concurrently hit a record 9.7 million, when Mexico played Sweden at the same time as South Korea played Germany on June 27, 2018. The viewing peak the company recorded hit 5 million for the entire tournament in Rio. This also occurred when two games were played simultaneously – the US versus Germany and Portugal versus Ghana.

    Read Full Story
  • Streaming a World Cup game? You can thank these engineers in Cambridge
    The Boston Globe
    June 29, 2018

    World Cup streams, broadcast by Fox and other outlets, travel across the Internet on Akamai’s content delivery network, which looks for efficient ways to route data from the cameras and microphones in Russia to users’ computers and mobile devices.

    The process relies on hundreds of thousands of Akamai servers around the world that relay data to fans. The sheer complexity of the network and the volume of data mean there are plenty of opportunities for problems to arise, slowing or blocking the data flow and frustrating viewers. So some clients pay Akamai extra to keep an eye on its feeds from Cambridge, spotting and trouble-shooting problems when they emerge.

    Read Full Story
  • Trust Shouldn’t Be Cheap In Government IT Systems
    GCN
    June 28, 2018

    A zero trust model for security architecture is exactly what it sounds like. It assumes that every network segment, whether under agency control or on the public internet, is hostile and untrusted.

    There was a time when security architects assumed that their internal networks could be safe and trusted. When computers were all deskbound and hardwired to the corporate network, users who were logged into the enterprise network were assumed to be trusted -- whether they were SysAdmins, an accountants or an external contractors. As users have moved outside the walls of the office and applications have moved to the cloud, the assumptions driving these models need to be questioned.

    Read Full Story
  • Cynicism in Cybersecurity: Confessions of a Recovering Cynic
    Dark Reading
    June 27, 2018

    Anyone constantly dealing with complex computer systems teetering on the brink of disaster will likely succumb to the cult of cynicism. These four strategies will help you focus on the positive.

    Cynics fall into the same category as Marines (if you're feeling charitable) and cheaters (if you're not) in that there's no such thing as an ex-cynic. But I'm doing my best: I'm a recovering cynic.

    Read Full Story
  • DDoS Attacks On The Rise; China and Russia Behind Most Credential Abuse Attacks, Report
    CSO
    June 26, 2018

    As for the memcached reflection attack vector, Akamai saw the largest ever attack on the internet in February. During the recording-setting 1.35 Tbps attack against a software company, attackers opened a gushing firehose of traffic by taking advantage of “memcached servers as reflectors that enabled attack amplification at orders of magnitude greater than previously seen with other reflection attacks.” Fortunately admins got busy mitigating the issue, which cut the 50,000 vulnerable servers down to a few thousand.

    Read Full Story
  • Cloud gaming has potential, but its execution isn’t a breeze
    Venture Beat
    June 23, 2018

    GamesBeat: I started covering cloud gaming very intensively with OnLive. I wrote some of the first stories on OnLive, and then some of the last stories, when it went away. Nearly a decade after that, what are the lessons of that?

    Nelson Rodriguez: That it’s hard. [laughs] What’s interesting about the panel is that I think the panel represents the three key questions for cloud gaming. When I talk about cloud gaming I’m talking about remote control games, server-based games. The three questions are: will the content be any good? Second, will the business model work? Is the price right for consumers without bankrupting the publishers? And third, does the tech work? Can it get under 200 milliseconds latency? Does it feel like your controller’s broken?

    I don’t think there’s a question about whether customers want it or not. To me, that’s different from VR. There’s a question about whether the average person wants VR. For cloud gaming, there will never be a question about this. People will always prefer to immediately get what they want. The question is just, can we do it? Will publishers deliver good content at the right price and will the experience be viable? That’s what I’m curious to understand.

    Read Full Story
  • Vivo IPL Cricket Final Is a Record-Breaker for Hotstar and Akamai
    Sports Video Group
    June 18, 2018

    This season’s concurrent–live-views records easily beat Akamai’s previous record of 4.8 million during the ICC Champions Trophy Final between India and Pakistan in June 2017, also a cricket match offered by Hotstar. Akamai’s next-largest live stream was the U.S. presidential inauguration in January 2017, with 4.6 million views.

    When Akamai’s engineers see that an upcoming event has the potential to create a significant draw, they do a little advance work to prepare for the load. That includes taking a look at their mapping systems to make sure they’ve mapped the event properly, creating a delivery map that not only builds in resiliency and redundancy but also allocates additional server capacity in regions where they expect extreme demand.

    Read Full Story
  • Zero Trust Model Ripe For Data, Election Security
    MeriTalk
    June 15, 2018

    The zero trust model of IT security has a wide range of applications from protecting government data to helping to secure election infrastructure, panelists said at the Akamai Government Forum on June 14.

    “I don’t think we have any choice. With all the threats and compromises, we need another layer … to sit in there and address all these risks,” said Roger Barranco, senior director of global security operations for Akamai.

    Read Full Story
  • Cyber Games at the World Cup 2018
    CSO Syn City
    June 11, 2018

    While it’s not exactly a DDoS or a traditional web application attack, one of the biggest threats we expect the average user will be aware of is the use of bots to buy event tickets. Bots being trained to buy tickets or products, like shoes, are a known problem at most events, so it’s almost certain that there are organized efforts to purchase tickets for scalping. There’s a constant dance between event organizers and criminals who want tickets for resale, something Akamai is interested in helping combat.

    Read Full Story
  • IPv6 makes progress, but much work remains
    Network Computing
    June 06, 2018

    Internet Society report shows widespread deployment of the new internet protocol worldwide, but enterprises lag and regional registry observes slowdown in IPv6 growth this year.

    Six years after it brought together thousands of ISPs and website operators together to participate in World IPv6 Launch by permanently enabling IPv6, the Internet Society says the new internet protocol has made dramatic progress.

    Read Full Story
  • Cyber Security Is Akamai Technologies’ Fastest Growing Business
    Working Nation
    June 05, 2018

    Cybersecurity incidents top the list of the most critical threats to the federal government, to businesses and individuals. The threat is massive, and the need for cybersecurity experts is just as significant. The problem is there are not enough experts to go around.

    “Every aspect of what we do today depends on the internet, and there are just so many potential attack factors,” according to Dr. Tom Leighton, CEO and Co-founder of Akamai Technologies. “Cybersecurity is a field that’s just moving very quickly, and there’s a huge shortage of experts out there.”

    Read Full Story
  • Hotstar, Akamai claim online streaming record
    Advanced Television
    May 24, 2018

    Indian premium streaming platform Hotstar, together with cloud delivery platform specialist Akamai Technologies, are claiming streaming history on May 22nd during the first qualifier match of cricket’s VIVO IPL 2018.

    The match between Sunrisers Hyderabad and Chennai Super Kings attracted an unprecedented 8.26 million peak concurrent viewers tuning in simultaneously to witness the match’s conclusion, breaking all previous records in online video streaming. Over four hours, more than 26 million viewers tuned into Hotstar to watch the match.

    Read Full Story
  • As Sports-Media Organizations Transition to IP, Network Security Concerns Take Center Stage
    Sports Video Group
    May 23, 2018

    Sports Media’s Success Makes It a Ripe Target. Although much of the discussion around security in the M&E business has centered on studio films and episodic television, the potential danger to live sports is quickly becoming apparent. For example, Shane Keats, director, global industry marketing, media and entertainment, Akamai, described how a sports league that runs a major tournament reached out to the company in the spring after traffic registered a massive spike in the middle of the night. It turned out that a Russia-based botnet was attacking the page. The botnet was scraping the data and reposting it on a pirate site, illegally monetizing the content.

    Read Full Story
  • Japan's Biggest Bank to Switch on Blockchain Payments in 2020
    Fortune
    May 21, 2018

    Japan’s biggest bank has codeveloped a new blockchain, or distributed financial ledger, to boost the speed and lower the cost of payments.

    Over the past year and a half, Mitsubishi UFJ Financial Group, or “MUFG” for short, partnered with Akamai, a U.S. tech company, to design a blockchain that can handle 1 million transactions per second at latencies of less than 2 seconds, meaning the time it takes to confirm a batch of transactions on the ledger, the companies said. They expect the service to be capable of handling 10 million transactions per second as they continue to improve the technology, they said.

    Read Full Story
  • Akamai enables Salesforce Commerce Cloud customers to access its web performance solutions
    ETtech
    May 21, 2018

    Content delivery network Akamai has announced its new Akamai Connector for US-based cloud computing company Salesforce 's Salesforce Commerce Cloud in a bid to provide a protected and safe corridor for online businesses across the world.

    The integration is aimed at enabling Salesforce customers to optimise their businesses with Akamai's Cloud security and web performance solutions, protecting sites, mobile infrastructures and Application programming interface (API)-driven requests from malicious attacks.

    Read Full Story
  • Nigeria reaches 30% internet traffic domestication, helped by Akamai connection
    Telecompaper
    May 21, 2018

    Nigeria has achieved a local internet traffic domestication rate of 30 percent, Nigeria Communications Week reported. Muhammed Rudman, managing director of the Internet Exchange Point of Nigeria (IXPN), told the publication that the 30 percent retention rate was reached through the recent connection of Content Delivery Network (CDN) provider Akamai to IXPN.

    Rudman said making domestic traffic local is the objective of the establishment of IXPN, which provides infrastructure for content providers and internet service providers (ISPs) to exchange traffic, as against such traffic travelling abroad and coming back to the country. Rudman explained that with Akamai servers in Nigeria, internet users in the country seeking content on the servers of Akamai do not need to move out of the country to access such content.

    Read Full Story
  • Akamai Connector Integrates with Salesforce Commerce Cloud
    eWeek
    May 17, 2018

    Cloud-service delivery platform maker Akamai Technologies has forged a significant new connection with the world’s No. 1 customer relationship management provider, Salesforce. The company on May 17 launched something called the Akamai Connector for Salesforce Commerce Cloud, which already enables enterprises to provide personalized experiences for shoppers through web, mobile, social and in-store environments.

    Using the Akamai Connector, brands now will be able to provide unified experiences for customers that extend beyond ecommerce to include marketing and customer service. Thus, enterprises will be able to communicate with customers and potential customers outside of the shopping cart channel only.

    Read Full Story
  • Are You Ready for Enabling the User Experience in the Mobile Travel Era?
    cntour2 (China)
    May 17, 2018

    English summary: As a world tourism power, China saw a tourism boom during this past three-day May Day holiday. According to the China Tourism Academy, the country's tourism industry raked in 87.16 billion yuan in revenue during the holiday, up 10.2% from a year earlier. Of that, the tourists from 270 cities across the country used online website and mobile applications to reach 930 domestic and foreign destinations! Mobile devices have become indispensable tools.

    Read Full Story
  • The Impending Death of the Traditional Password (and Blame Game)
    Forbes
    May 15, 2018

    I’ll admit passwords are a curious thing. The rationale is sound. Using something that is ostensibly a secret to protect access to your system or files. But, as you scratch away at the surface – things are not as rosy as we might like to believe.

    For the time being, make sure that you invest the time to educate your users on how to create a good password. Teach them how to use, and provide them with, password managers. If you have a website, make sure that you are not contributing to the problem by forcing users to have weak passwords. Where possible, leverage two-factor authentication. These days there really isn’t a good reason to not have this or multi-factor authentication incorporated into your web properties.

    Read Full Story
  • CIO’s discerning ability required in API Economy era – Akamai Executive
    IT Leaders (Japan)
    May 15, 2018

    English summary: Akamai Technologies, which started with CDN, is now shifting its focus toward supporting enterprise DX today with the advantage of its cloud platform that consists of an enormous number of servers connected by a high-speed network. How to see market movements, its solutions and his expectations for the Japanese market.

    for these modern Chinese tourists, whether they are used for getting to the airport, checking in, booking travel tours, managing itineraries, unlocking hotel rooms, handling customer service problems, or looking for what to do and where to eat.

    Read Full Story
  • Paying IT Forward For Mother's Day
    Forbes
    May 11, 2018

    With Mother’s Day approaching, Dave Lewis takes a look at IT and security through the eyes of our parents, explaining that it’s now our turn to help them. “In many cases, our parents could use help to better secure themselves. Helping them to understand the risks and providing them with tools that can make it easy for them to be protected is a win. If a security tool is too difficult for a non-technical person to make use of, then the efficacy of the tool is suspect at best.”

    Read Full Story
  • Reflecting on the Memcached Reflection Attacks: A Wake-Up Call for Developers
    SecurityIntelligence
    May 8, 2018

    Looking back on the memcached reflection attacks, Martin McKeay notes how it proved bad guys haven’t stopped their search for new pools of vulnerable protocols and services to exploit. “It took compounded vulnerabilities and a change to default configurations to turn the memcached service into the threat it became earlier this year. These attacks serve as a reminder that security has to be a primary consideration from the development stage of a piece of software through to its end of life. The cold, hard truth is that eventually, every service will be exposed, even if it was built for entirely legitimate purposes.”

    Read Full Story
  • Andy Ellis on Zero-Trust Security Model
    Collective Intelligence Podcast
    May 8, 2018

    Andy Ellis appeared on the Collective Intelligence Podcast to discuss Akamai’s implementation of a zero-trust security model. During the interview, Andy explained how the 2009 Aurora attack inched Akamai toward zero-trust, how he got executive buy-in for this model, what the user experience is like, and how this compares to Google’s BeyondCorp implementation.

    Read Full Story
  • SVG Australia Summit: Akamai’s Will Law Dives Deep Into OTT Tech
    Sports Video Group
    May 7, 2018

    In a presentation at the SVG Australia Summit, Will Law took attendees through an overview of key OTT technologies with a focus on content protection, redundancy, low latency and the AV1 format. In regard to redundancy, Will explained how a live stream can be protected in light of the numerous potential points of failure. “Solutions include splitting the encoders into both physically and network-topographically separate cloud encoders; adding a second instance of liveOrigin, which can also be connected to both cloud encoders; or a second CDN or a CDN that can guarantee multiple redundant paths through the same architecture.”

    Read Full Story
  • 4 Steps to the Right Image Management Workflow
    Website Magazine
    May 2018

    Akamai’s Parag Pathak writes about image management in a piece for Website magazine. “There are a variety of players who have a seat at the table to discuss image management from designers to IT managers to marketing pros to developers. However, all too often, these different departments operate in silos, hindering communication about the overall image workflow and slowing the process to a crawl.”

    Read Full Story
  • Best Practices for Premium Video Streaming, Part 1
    Streaming Media
    May 2, 2018

    The first entry in Akamai’s series of best practices for delivering premium video content focuses on managing the first mile. Peter Chave and Alex Balford explain how “the goal is to meet performance parameters achieved by traditional modes of primary distribution over satellite and legacy fiber transport with full backup redundancy, and the ability to quickly identify and mitigate issues.”

    Read Full Story
  • Five Ways Cyber-Criminals are Trying to Cash in on Crypto-Currency
    eWeek
    May 1, 2018

    For an eWeek story on cybercriminals and crypto-currency, Akamai’s Ryan Barnett discussed how devices can be taken over for crypto-mining. “Most recently, attackers have used vulnerabilities in Apache Struts and Drupal to infect web servers with their programs, which also often attempt to infect visitors' systems with crypto-mining tools. While these are the most current vulnerabilities, attackers are agile and will quickly migrate to new vulnerabilities that will allow them download their crypto-mining tools into vulnerable systems.”

    Read Full Story
  • Why You Need A Holistic, Integrative Medical Approach to Cybersecurity
    Forbes
    April 30, 2018

    Forbes covered Andy Ellis’ RSA keynote address and his message that the goal of cybersecurity should be to enable the business. He supported the assertion by describing Akamai’s two-factor no-password approach to cyber security:

    • When a user wants access to an application, each device authenticates seamlessly to each application, which then triggers a user notification.
    • Then, a notification message is sent to the user’s cell phone. The user responds and gets access.
    • No passwords are used.

    Read Full Story
  • Infocalypse: The terrifying technologies behind the next stage of ‘fake news’
    Yahoo!
    April 27, 2018

    Akamai’s Jay Coley discusses the use of malware as a tool for spreading fake news, explaining that ‘troll farms,’ which became notorious during the 2016 American election, are now switching to different, more subtle tactics. “If you look at some of the troll farms we see operating, they’re coming into the spotlight more and more. Hackers are looking for different methods of doing this: we’re seeing a resurgence of ‘credential stuffing’ attacks where people steal social media logins.”

    Read Full Story
  • Thanks To Live Sports, India's Hotstar Is Going Where No Other Streaming Service Has Gone Before
    Forbes
    April 26, 2018

    Hotstar’s work with Akamai to live stream record-breaking coverage of IPL cricket is featured in this Forbes story: “On April 10, at one point during a league match of Indian Premier League (IPL), 5.5 million concurrent viewers were tuned to Hotstar, one of India’s leading video streaming service. For Akamai, the world’s largest cloud delivery platform that powers Hotstar, this was the highest ever for any live streaming sporting event in the world and the largest for any single event online by a broadcaster.”

    Read Full Story
  • Another Tech Company Steps Up Its Giving for K-12 STEM Education
    Inside Philanthropy
    April 24, 2018

    Akamai’s recent endowment to The Akamai Foundation and our continued efforts to promote STEM education in grades K-12 are highlighted in Inside Philanthropy: “The Akamai Foundation already has invested $5 million toward STEM education since it was created, mostly through working with national and local nonprofit partners, rather than directly with schools or districts. The $50 million is meant to allow the foundation to expand its work internationally to regions where Akamai has offices.”

    Read Full Story
  • Digital Maturity: Building Customer Trust Drives Success
    APM Digest
    April 23, 2018

    Ari Weil of Akamai writes about Akamai’s recent survey conducted with Forrester, which notes the need for businesses to balance innovation with security. “These findings showed that companies that meet the standards of being ‘digitally mature’ — that is able to balance innovation and security — experience faster growth than their competitors. The most digitally mature companies more frequently report double-digit revenue growth than their peers.”

    Read Full Story
  • Tackling security debt: The role of risk register, patch management
    SearchCIO
    April 17, 2018

    In part two of his Q&A with SearchCIO, Akamai’s Dave Lewis discussed “security debt” and steps organizations can take to avoid it. “You have to look at it from the perspective of a risk register. A lot of companies will have some sort of risk register, but other companies don't want to have it because they don't want to have it as a discoverable piece of documentation, which is this very strange keep away game.”

    Read Full Story
  • CDN players work for efficient content delivery experience
    Indian Television
    April 16, 2018

    In a story about the role CDN’s are playing for OTT viewers in India, Akamai’s Sandeep Reddy discussed the importance of analytics to support good viewing experiences. “We have a tool called cloud test which helps to determine and underhand user interaction with the site. End user performance monitoring is a big area of focus.”

    Read Full Story
  • Online live sports increase availability, set records
    nScreen Media
    April 15, 2018

    At NAB last week, Akamai discussed the record peak of concurrent streams we reached in delivering Hotstar’s IPL cricket coverage. nScreen Media reported, “On April 10th, the IPL match between Chennai Super Kings (CSK) and the Kolkata Knight Riders (KKR) was streamed by Hotstar using Akamai Technologies cloud delivery network. According to Akamai, the match hit 5.5 million concurrent viewers, setting a record for the company. The previous record, 4.8 million peak concurrent users, was set during the India and Pakistan ICC Champions Trophy Final in June 2017.”

    Read Full Story
  • Cybersecurity Drills More Important Than Ever for Data Centers
    DataCenter Knowledge
    April 12, 2018

    Akamai’s Alejandro Ziegenhirt discussed with DataCenter Knowledge cybersecurity preparedness and the importance of running disaster response drills with customers. “The attack is usually performed by a third-party provider chosen by the customer," he said. "A common test plan will be run through multiple vectors of DDoS attacks, increasing in complexity and scope."

    Read Full Story
  • NAB 2018: Akamai Talks OTT, Hacking, and DDoS Protection
    Streaming Media
    April 11, 2018

    In a video interview at Akamai’s 2018 NAB Show booth, Shane Keats talks about the importance of cybersecurity as it relates to OTT video content. “If Willie Sutton were alive today, I'm convinced that he'd actually go after an OTT provider and not a bank because there is so much value inside that service that it becomes a really ripe target for the hacker.”

    Read Full Story
  • A Long-awaited IoT Crisis Is Here, and Many Devices aren’t Ready
    Wired
    April 9, 2018

    Akamai’s Chad Seaman spoke with Wired about the new Akamai report highlighting ongoing flaws and vulnerabilities in Universal Plug and Play (UPnP) implementations. "We started talking about how many of these vulnerable devices are out there and what can they be leveraged for, because most people seem to have forgotten about this vulnerability."

    Read Full Story
  • The Account Checker Knocking at Your Door
    Security Intelligence
    March 29, 2018

    “Credential abuse and account checkers may actually outnumber legitimate login attempts by a factor of greater than 4 to 1,” explains Akamai’s Martin McKeay in this SecurityIntelligence story. “As long as users reuse the same login and password across multiple sites, account checkers will prosper. It’s an attack that offers little risk for a potentially huge reward.”

    Read Full Story
  • Beware the Blind Spot in Performance Testing for DevOps
    DevOps.com
    March 28, 2018

    Akamai’s Anthony Larkin authored an article for DevOps.com that explains the need for speedy update rollouts that are balanced with performance testing in DevOps workflows to help ensure positive customer experiences. “Faster time to market is important, but as important is making sure the customer experience continuously improves as well. Uniting cloud delivery with DevOps workflows and keeping performance in mind will put your business on the path to ensuring both faster rollouts and superior user experiences.”

    Read Full Story
  • Faster internet, birth of a multi-billion dollar content delivery industry
    National Science Foundation
    March 27, 2018

    This National Science Foundation (NSF) blog post highlights the NSF’s role in Akamai’s early days. “NSF-funded researchers at the Massachusetts Institute of Technology (MIT) developed algorithms to quickly deliver content via a geographically distributed network of servers, reducing internet congestion. The work launched a multi-billion-dollar industry, and two members of the research team founded Akamai Technologies.”

    Read Full Story
  • The ethics of AI in the shadow of GDPR
    CSO
    March 26, 2018

    In this story for CSO, Akamai’s Dave Lewis stresses the need for greater discussion around the ethics of AI and how data security and privacy will be addressed. “If we are the stewards of a data set, we should ask pertinent questions when dealing with that data. Do you just blindly feed it into an AI system? No, of course not.”

    Read Full Story
  • Professor Tom Leighton wins 2018 Marconi Prize
    MIT News
    March 22, 2018

    Tom Leighton on being honored with the 2018 Marconi Prize: “Being recognized by the Marconi Society is an incredible honor,” said Leighton. “It’s an honor not just for me, but also for Danny Lewin, who created this company with me, and for all of the people at Akamai who have worked so hard for over two decades to make this technology real so that the internet can scale to be a secure and affordable platform where entertainment, business, and life are enabled to reach unimagined potential.

    Read Full Story
  • Akamai on delivering the India-South Africa cricket series live through the cloud
    Sports Video Group Europe
    March 22, 2018

    SonyLIV, cricket and Akamai’s partnership with Yospace for dynamic video ad insertion are featured in Ian Munford’s interview with SVG Europe. “We have a mantra around creating video streams that are as elegant as you see on TV, and the advertising aspect of that as well.”

    Read Full Story
  • Akamai plugs content network into digital drive
    Bangkok Post
    March 19, 2018

    Ash Kulkarni talks discusses Akamai’s expanding its investment in Thailand to capitalise on digital transformation opportunities and the rise of internet streaming. "The digitisation boom, thanks to a healthy push by the government and disruptive technology in many sectors, has driven internet network performance to become more crucial to companies.”

    Read Full Story
  • Andy Ellis Has Your Back
    Decipher
    March 19, 2018

    The calm demeanor that Andy Ellis carries is contrasted with the "several hundred million reasons for Ellis to be worried, in the form of the data feeds coming in from Akamai’s worldwide network” in this Decipher profile. “When you’re solving all the problems you can solve with software,” Andy explains, “you never have to worry that seconds matter. There’s no single data center that should matter in our network.”

    Read Full Story
  • SonyLIV Banked on Akamai to Leverage Ad Insertion for India-South Africa Series
    Indian Television
    March 15, 2018

    In a story about SonyLIV’s use of Akamai for live ad insertion during the India-SA cricket series, Akamai’s Sidharth Pisharoti discusses the the importance of providing high-quality experiences for viewers and advertisers. “While the challenge on the one hand is to keep audiences engaged with a TV-like experience, the equally hard part is ensuring that advertisers see value in leveraging digital platforms to drive views and consequently, revenue through advertisements. With Akamai’s capabilities, we were able to successfully deliver what audiences and advertisers wanted over the course of the India-South Africa series.”

    Read Full Story
  • Why bots are too smart for their own good
    Tahawul Tech
    March 14, 2018

    This Tahawul Tech column discusses the development and capabilities of Akamai’s Bot Manager, explaining that it “delivers a simple but effective solution, and detects a range of data points, including mouse movements for a desktop login and hand movements for a smartphone, to distinguish between whether the user is a human, or a bot.”

    Read Full Story
  • Memcached DDoS Attacks
    Collective Intelligence Podcast
    March 14, 2018

    Flashpoint Editorial Director Mike Mimoso talks to Chad Seaman and Lisa Beegle of the security intelligence response team at Akamai about the recent and record-setting Memcached DDoS attacks.

    Read Full Story
  • AI Can Help Battle Bots
    MeriTalk
    March 13, 2018

    Akamai solution engineering manager Drew Reinders spoke with MeriTalk, a government IT publication, about the need for bot managers and particular requirements. “Right now, many Federal websites are one-way consumption,” he explained. “As we expose more two-way interaction with public-facing sites where user names and passwords are required, that is where the risk will increase.”

    Read Full Story
  • Availability As A Pillar Of Media
    TV Technology
    March 11, 2018

    In this TV Tech byline article, Akamai’s Dave Lewis takes a look at the importance of video service availability from a security perspective while managing to slip in a “Knight Rider” reference. "With the abundance of affordable streaming services that are available today for the consumer—the need to ensure availability is of paramount importance. If a customer is watching a sporting event and the event starts to buffer and the image becomes blurry you can be certain that those customers will shift their allegiances before the buffer can catch up."

    Read Full Story
  • Wall Street Take Note: Akamai Is A Platform, You Can’t Separate Their Media Business
    StreamingMediaBlog
    March 8, 2018

    Dan Rayburn writes about the power of the Akamai platform and the innovations being made for the future of online content delivery. “Focusing on protocols and new distribution techniques is a bet that Akamai is making on their long term plan and Akamai recently combined their carrier and media business, since more content is becoming available through service provider channels.”

    Read Full Story
  • GitHub suffers biggest ever DDoS, goes down for just 10 minutes
    Digital Journal
    March 5, 2018

    Widespread coverage of Akamai helping GitHub to fend off last week’s record-breaking DDoS attack continued in numerous publications this week, including Digital Journal. The story explains how migrated its service to Akamai, the Akamai CDN platform, providing “additional edge network capacity to help mitigate the impacts of the DDoS and keep the service available to users. This process was initiated at 17:26 UTC on Wednesday – 5 minutes after the attack commenced – and completed within 4 minutes. It succeeded in mitigating the attack by blocking it at the edge of Akamai's cloud.”

    Read Full Story
  • Hackers Are Stuffing DDoS Attacks with Monero Ransom Notes
    Fortune
    March 2, 2018

    Akamai’s Chad Seaman and Lisa Beegle spoke with Fortune on the new trend of hackers stuffing ransom notes into inbound attack traffic. “It’s actually like a DDoS attack with a phishing attack with an extortion attack all rolled into one,” Chad told Fortune. Lisa added, “We’ve seen dozens upon dozens of extortion requests, but never in the payload itself, so to speak.”

    Read Full Story
  • GitHub Survived the Biggest DDoS Attack Ever Recorded
    Wired
    March 1, 2018

    In a story that generated wide global coverage, Akamai’s Josh Shaul tells Wired how Akamai helped GitHub fend off what’s believed to believe the largest ever reported DDoS attack at 1.35 Tbps. “We modeled our capacity based on five times the biggest attack that the internet has ever seen. So I would have been certain that we could handle 1.3 Tbps, but at the same time we never had a terabit and a half come in all at once. It’s one thing to have the confidence, it’s another thing to see it actually play out how you’d hope."

    Read Full Story
  • Another massive DDoS internet blackout could be coming your way
    CSO
    February 28, 2018

    Andy Ellis speaks with CSO about DNS and RFC 2182: While some of the RFC suggestions are now out of date--swapping secondary zones with another organization now seems a bit antiquated--the fundamental principles of avoiding central points of failure and ensuring redundancy haven't changed. "Provider redundancy both gives you scale, and ensures that issues with one provider don't take your business offline," Ellis says.

    Read Full Story
  • Enterprises need a new security architecture: Graeme Beardsell
    Mint
    February 28, 2018

    Leading up to his presentation at the Mint EmTech 2018 Conference, Akamai’s Graeme Beardsell spoke with Mint about the challenges of keeping businesses online round-the-clock, the need for a new security architecture and how the Internet of Things (IoT) is complicating matters. “Security should be designed to take advantage of the shape of the Internet and not try to defy it.”

    Read Full Story
  • Memcached Servers Being Exploited in Huge DDoS Attacks
    Dark Reading
    February 27, 2018

    Dark Reading interviewed Akamai’s Chad Seaman and Domingo Ponce with Jai Vijayan regarding the latest wave of DDoS attacks exploiting Memcache servers. “The use of default settings and reckless administration overall among many enterprises has resulted in a situation where literally tens of thousands of boxes running Memcached are on the public-facing Internet, Seaman says. Adds Ponce, “Organizations also need to ensure they have the bandwidth to absorb the attacks while allowing legitimate traffic to remain up.”

    Read Full Story
  • Live From PyeongChang: Akamai Supports a Parade of Nations in Their Streaming Efforts
    Sports Video Group
    February 23, 2018

    Sports Video Group caught up with Akamai’s Joachim Hengge at the International Broadcast Center in PyeongChang to find out how Akamai supported the Winter Olympics live streaming efforts of more than 30 broadcasters and partners around the world. “In general, when we look at Olympics, it is a perfect use case for online video, I would say: there’s so much going on at the same time, and, on your linear TV feed, you always have just that one sport that’s most popular.”

    Read Full Story
  • Live stream of games may lead to increasing hacking risks
    Hong Kong Economic Times
    February 21, 2018

    Akamai’s Fernando Serto discusses how viewers of major events like the Olympics and World Cup and serve as easy targets for hackers, and steps consumers can take to secure their devices and personal information.

    Read Full Story
  • The borg ate my login
    CSO
    February 20, 2018

    Looking at data released this week in Akamai’s State of the Internet / Security report, Martin McKeay highlights that a large portion of login traffic is malicious and a great deal of bot traffic is nefarious. He also notes that there is no “one size fits all” solution for bots, stressing the importance for organizations to understand how traffic is related to bots and credential abuse in order to take appropriate steps for protection.

    Read Full Story
  • The Art of Disclosing Your Incident Response Strategy to the Public
    Security Intelligence
    February 20, 2018

    Given the heightened profile of security vulnerabilities in the public eye, Akamai’s Martin McKeay writes about the factors businesses should consider when responding to security incidents.

    Read Full Story
  • Problem Solvers: Fooda, Mobile Cuts, & Disappearing
    Chronicle
    February 16, 2018

    Boston’s venerable TV news magazine, Chronicle, visits Akamai’s Cambridge headquarters to see how employees are taking advantage of the Fooda pop-up lunch service.

    Read Full Story
  • 6 ways to ensure agency websites are up to speed
    Federal Times
    February 14, 2018

    As more people increasingly turn to online services to complete everyday tasks, a website that is slow to load can easily lead to frustration. Citizens have high expectations when it comes to browsing the web across the number of devices available, be it a mobile phone, tablet or desktop. In fact, 47 percent of end users expect a website to load in two seconds or less on a PC and 69 percent expect the same for a tablet.

    For the public sector, a slow website generally does not lead to lost revenue, but it can lead to distrust and frustration among constituents who may be unable to easily complete important services, like registering for healthcare or updating account information to receive Social Security benefits. Especially as more agencies are going green and moving away from sending statements and documents via mail, agency websites are sometimes the only way that constituents can stay in the know on government services and, thus, strong website performance is key.

    *Authored by Tom Ruff, Vice President of Public Sector, Akamai

    Read Full Story
  • Hackers organize themselves
    AG Connect
    February 13, 2018

    The changing motives of hackers pose the biggest challenge for security teams. Malicious hackers are less driven by personal envy against the companies they are attacking and are instead, moving to organized crime. Security teams need to change their strategy to cope with this new type of hacker.

    *Authored by Jay Coley, Senior Director Security Strategy and Planning EMEA, Akamai

    Read Full Story
  • A culprit for financial site glitches: you and your apps
    Reuters
    February 12, 2018

    In a widely syndicated interview with Reuters, Akamai’s Rich Bolstridge described the wide adoption of mobile apps in finance as “the number one factor in the riskier situation that brokers and investment firms face today,” as customers get used to logging in with the ease of a thumbprint.

    Read Full Story
  • The network is responsible for IoT security
    Security Insider
    February 12, 2018

    More and more companies use IoT devices. Keeping pace with the trend of digitalization and the Internet of Things, companies often forget to take care of one key component: Security. The latter cannot be provided by sensors and IoT applications themselves. The only thing that currently helps is a resistant and protective network. In this article, Bernd König explains what has to be done to build a robust and secure IT infrastructure.

    *Authored by Bernd König, Director Product Line Security EMEA, Akamai

    Read Full Story
  • Here's how to watch the Winter Olympics without cable
    USA Today
    February 8, 2017

    In the run-up to the Winter Olympics, Peter Chave spoke with USA Today on the many options available to live stream the games.Each of the streaming services will use different approaches to present the Olympics “in their own flavor,” says Peter Chave, principle architect at Akamai Technologies, which provides cloud services and global delivery of streaming video including the Olympics Games.

    Read Full Story
  • How Retailers Can Avoid a Website Outage Disaster
    Total Retail
    February 7, 2018

    High web traffic is a major goal for every online retailer, but slowdowns and outages can result if you’re bombarded with more traffic than expected, writes Manuel Alvarez in a byline story for Total Retail. He explains how companies should work with their web teams to proactively develop policies to manage these unanticipated peaks.

    Read Full Story
  • Akamai: IoT the new 'shadow IT' of the enterprise
    ZDNet
    February 5, 2018

    Internet-connected devices are already everywhere in the consumer space, but as they make their way into the organisation, they pose a threat to the security of enterprise networks. Akamai’s Patrick Sullivan tells ZDNet that IoT devices are an issue for everybody. “It's a very active attack surface and I think if you look around the world, there are various governments that are starting to consider whether they need to weigh in with tighter regulation of the IoT devices."

    Read Full Story
  • How to tell if your website has been visited by a bot: 5 tips
    TechRepublic
    February 2, 2018

    In a conversation with TechRepublic, Akamai’s Patrick Sullivan noted how monitoring macro-level success and failure rates of login attempts can help detect bots. "Regardless of how advanced the bots are and how difficult they are to identify, credential stuffing generates high levels of failed logins.”

    Read Full Story
  • New cryptocurrencies offer better anonymity, new security challenges
    CSO
    February 1, 2018

    Akamai’s Benjamin Brown discussed with CSO how cryptocurrencies are showing up on the dark web. "Monero is already being integrated into multiple darknet markets, has been used in cybercrime campaigns, and is the preferred currency of the Shadow Brokers.”

    Read Full Story
  • BigCommerce begins offering Akamai’s Image Optimization Tool to Sellers
    ZDNet
    January 30, 2018

    Akamai customer BigCommerce announced this week that it is offering Akamai Image Manager to help online sellers avoid slow-loading pages due to outsized, high-resolution images ahead of Google's plans to make page load speed a consideration for mobile search rankings. BigCommerce named oversized images the number one culprit for bogged down page loads and poor buyer experiences.

    Read Full Story
  • GDPR compliance: What companies need to know
    Digital Business Cloud
    January 25, 2018

    With four months remaining until the EU General Data Protection Regulation (GDPR) requirements go into effect, a host of media outlets across Europe have covered Akamai’s recent release of best practices to maintain compliance with the new mandates.

    Read Full Story
  • Cyber’s ‘Flaming Sword of Justice’ Won’t Save Companies, Says Akamai Security Expert
    The Wall Street Journal
    January 25, 2018

    Akamai’s Global Security Advocate Dave Lewis sits down with The Wall Street Journal to talk about our current state of security debt and why it's a culture shift to understand how and why security should be an integral part of designing any IT capability. Please note the full article is gated for subscribers.

    Read Full Story
  • Organisations that can’t prove the adequacy of risk-based security could fail GDPR compliance, says Akamai Technologies
    FreshBusinessThinking
    January 25, 2018

    In light of the upcoming General Data Protection Regulation (GDPR) requirements intended to protect the personal data and privacy of EU citizens, Akamai Security Solutions Engineering Manager Gerhard Giese urges organizations to follow industry best practices in order to maintain compliance with the new mandates.

    Read Full Story
  • Akamai's Variations: CDN Is Locked in 4 Main Development Directions and Security Plays an Increasingly Vital Role
    C114
    January 25, 2018

    C114 in China spoke with Wentao Li, Akamai Web Solutions Engineering Manager, and Chandler Zhang, Regional Media Sales Manager, about the important roles Akamai technology plays in delivering connected experiences to businesses and consumers, as well as a general overview and history of the Company.

    Read Full Story
  • Why cricket fans have embraced OTT
    Broadcast
    January 24, 2018

    Lynnette Kerry, Regional Sales Manager for Akamai, authored an article for Broadcast magazine that discusses the benefits of over the top (OTT) video delivery as they relate to cricket fans.

    Read Full Story
  • IoT Security: The network is in the duty
    IP Insider
    January 22, 2018

    The proliferation of IoT means companies must pay even greater attention to the related security risks. Bernd König, Akamai Security Product Line Director in EMEA, wrote an article IP Insider and IT Business in Germany on the requirements for building a robust and secure IT infrastructure.

    Read Full Story
  • Akamai Named a 2018 Thomson Reuters Top 100 Global Technology Leader
    Thomson Reuters
    January 17, 2018

    This week, Akamai was named to Thomson Reuters Inaugural Top 100 Global Technology Leaders listing, a program that identifies the industry's most operationally sound and financially successful organizations. Thomson Reuters utilized a 28-data-point algorithm to objectively identify organizations with the fortitude for the future in today's complex business environment. The methodology measured the performance of 5,000 technology companies across eight pillars: Financial, Management and Investor Confidence, Risk and Resilience, Legal Compliance, Innovation, People and Social Responsibility, Environmental Impact, and Reputation. In addition, the Thomson Reuters list ( announced this week ) also revealed that the identified 100 organizations outperform the NASDAQ, S&P 500, and MSCI World indices in year-over-year stock price change.

    Read Full Story
  • What is Zero Trust? A model for more effective security
    CSO
    January 16, 2018

    The Zero Trust Network, or Zero Trust Architecture, model was created in 2010 by John Kindervag, who at the time was a principal analyst at Forrester Research Inc.

    Now, seven years later, CIOs, CISOs and other corporate executives are increasingly implementing Zero Trust as the technologies that support it move into the mainstream, as the pressure to protect enterprise systems and data grows significantly, and as attacks become more sophisticated.

    “The strategy around Zero Trust boils down to don’t trust anyone. We’re talking about, ‘Let’s cut off all access until the network knows who you are. Don’t allow access to IP addresses, machines, etc. until you know who that user is and whether they’re authorized,’” says Charlie Gero, CTO of Enterprise and Advanced Projects Group at Akamai Technologies in Cambridge, Mass.

    Read Full Story
  • Cyber safety: Companies should re-examine security controls to defend themselves against threats
    FirstPost
    January 15, 2018

    As organisations plan their IT budgets and cyber security defenses to defend against the threats they will face in the coming year, the questions is: What should they expect from hackers? Everything. This may sound flippant, but the truth is that everything we have built as the foundation of our security practices is rapidly changing. The rate of change will accelerate in 2018, with no indicators of slowing down in the near future.

    In 2017 we saw businesses having to patch their systems which shrank from months or years to weeks or days. No one needs a 0-Day if they know the business doesn't have a patching window until the end of the quarter or that they will probably miss one or two servers no one was administrating.

    To prepare for this reality, here are some of the highlights that I think we will see in the cybersecurity industry in 2018.

    Read Full Story
  • A CDN – if it’s doing its job, your customers won’t know it’s there
    ITProPortal
    January 15, 2018

    The internet promised to revolutionise the way we shop – no more queues, no more traffic jams; just what you want, when you want it. And, when digital delivery arrived for entertainment products, like music, videos and games, the opportunity to simplify the process got even bigger. However, without the right infrastructure, vendors can find themselves simply creating online versions of the same problems that they previously had on the high street.

    Let’s take the launch of a new video game as an example. Previously, whenever there was a big launch it would be common place to see large queues outside the store entrance with shoppers’ travelling from miles around eager to be the first to get their hands on the new product. With only a limited number of people serving customers, and security procedures to carry out for both the product and the payment and transaction itself, the shop soon fills up, the doorway becomes a bottleneck and queues stretch down the street. This log jam for customers quickly leads to frustration.

    With this direct line to the customer, brands now need to be evermore careful that online launches are planned thoughtfully and they ensure they have the right infrastructure in place. So how can brands ensure that they have made the right investments to prepare for success?

    *Byline article by Akamai Global Director of Media Industry Strategy Nelson Rodriguez

    Read Full Story
  • The Evolution of Mirai as a Cautionary Tale
    SC Media
    January 11, 2018

    It was just over a year a year ago when the flood gates opened and the packets rained down as a new player made itself known. The Mirai botnet had made it's debut on the world stage. This was a game changer in every sense of the meaning. A botnet had revealed itself to the world that was built on the metaphorical backs of thousands to Internet of Things (IoT) devices. This botnet was capable of distributed denial-of-service, or “DDoS” attacks, which could deliver over 600 Gbps of traffic right out of the gate. A staggering, and previously unseen volume up to that point in time.

    The malicious code, dubbed Mirai, scanned the Internet looking for devices from its pre-ordained list of over sixty devices that were attached online. These devices had default credentials that Mirai would seek out in order to compromise further devices to add to the collective that topped 2.5 million IP addresses at its peak.

    Security needs to be baked into the process from the design stage. Back of napkin, noodling out ideas should have a star with security on it. Many IoT-related devices are consumer grade devices with planned obsolescence built into them but, security must still be considered. Mirai was an example of what can go wrong and unless these issues are properly addressed, it will not be the last lesson that we have to learn.

    Read Full Story
  • 3 Steps to Successful Bot Management
    Nextgov
    January 11, 2018

    Bots are a part of life for any organization doing business online, with many companies estimating that 40 percent of their online traffic is generated by bots. This profusion of bot activity is even more relevant for government agencies as more services move online and constituents expect equally exceptional service from public sector websites as they do from private. With more than 2.54 billion visits from September 2017 through November 2017, U.S. federal websites must be prepared to effectively and securely serve a growing number of visitors—both bot and human. In fact, some government agencies see 60 percent of their traffic attributed to bots.

    Traditional IP blocking provides only temporary pain relief until, inevitably, a bot operator detects the block, changes the IP, and starts a new bot invasion. Instead of the traditional approach of simply blocking as many bots as possible, a new paradigm of bot management helps agencies make more real-time and informed decisions on how to handle bot activity. This new model of bot management empowers agency IT to take a proactive approach to detecting, analyzing and making informed decisions on handling all types of bot activity on their websites.

    Read Full Story
  • Italian intelligence recruits graduates to protect its infrastructures from cyberattacks
    Repubblica.it
    January 10, 2018
    Translated summary

    After the cases of Meltdown and Specter, after the numerous bank data thefts such as that of Equifax, the Internet blockade caused by the Mirai botnet, the Wannacry epidemic, it has become impossible to sleep peacefully for companies and institutions in the face of the risks generated by cyberspace. This is why Italian intelligence is looking for graduates and graduates in ICT professions. The goal is to recruit them in the defense of national strategic assets and critical infrastructures that allow the company to function: roads, dams, hospitals, airports.

    The alarm of Kaspersky's manager is coupled with the predictions of Akamai, according to which the evolution of the Internet of Things - 50 billion people connected by 2020 - is creating an army of dormant bots that in 2018 could be exploited by cyber criminals with devastating effects. A situation that, Alessandro Livrea, Country Manager of Akamai Italy, is determined precisely "From the unstoppable evolution of artificial intelligences and machine learning that will bring with it experiences that are ever more engaging and personalized for users, but also new cyber threats".

    Read Full Story
  • Avaya CIO Fari Ebrahimi joins Akamai, seizing on 'a dream opportunity'
    Boston Business Journal
    January 4, 2018

    Cambridge-based Akamai Technologies Inc. has tapped Fari Ebrahimi , previously the chief information officer of Avaya, as its new CIO.

    Ebrahimi has been at Avaya, a California-based maker of corporate communication infrastructure, since 2013. Previously, he was an IT executive at Verizon Communications for more than a decade.

    "CIOs have the opportunity to be a change agent," Ebrahimi wrote in an email. "In Akamai’s case, they are already extremely successful, and I have the opportunity to leverage the company’s own technologies to further propel and enable transformation and growth. That is a dream opportunity for a CIO."

    Read Full Story
  • Melia enhances web performance and security
    CSO España (ComputerWorld)
    January 3, 2018

    The hotel group reinforces web security thanks to Akamai solutions implemented with the support of partners Telefonica, explains Llorenç Vives, Director of IT operations at Melia Hotels International.

    "Through its network and the intelligence it applies in the management of content traffic, Akamai’s smart platform guarantees that we reach our customers and meet their expectations thereby improving their purchasing experience and increasing real conversion rates", says Vives. "Their solution allows us to be much more efficient in scaling the infrastructure necessary to support the environments and the level of traffic we are growing".

    Read Full Story