Author Archives: Tony Lauro
You Can’t Eliminate Cyberattacks, So Focus on Reducing the Blast Radius
Tony Lauro, director of security technology and strategy at Akamai, discusses reducing your company’s attack surface and the “blast radius” of a potential attack. Continue reading You Can’t Eliminate Cyberattacks, So Focus on Reducing the Blast Radius
Are You Guilty of These 8 Network-Security Bad Practices?
Tony Lauro, director of Security Technology & Strategy at Akamai, discusses VPNs, RDP, flat networks, BYOD and other network-security bugbears. Continue reading Are You Guilty of These 8 Network-Security Bad Practices?
Human Fraud: Detecting Them Before They Detect You
Tony Lauro, director of security technology and strategy at Akamai, discusses how to disrupt account takeovers in the exploitation phase of an attack. Continue reading Human Fraud: Detecting Them Before They Detect You
The Underground Economy: Recon, Weaponization & Delivery for Account Takeovers
In part one of a two-part series, Akamai’s director of security technology and strategy, Tony Lauro, lays out what orgs need to know to defend against account takeover attacks. Continue reading The Underground Economy: Recon, Weaponization & Delivery for Account Takeovers
Beyond MFA: Rethinking the Authentication Key
Tony Lauro, director of security technology and strategy at Akamai, discusses hardware security dongles and using phones to act as surrogates for them. Continue reading Beyond MFA: Rethinking the Authentication Key
The evolution of MFA authentication technology and what needs to change next
Authentication attacks are big business, and no one is immune from them. In fact, two men were recently arrested and charged in the Twitter employee account compromise that happened in July 2020. Using employee account credentials, the attackers took over several highly visible celebrity Twitter accounts, which were then used for bitcoin scams. Think: "If you give me one bitcoin, I’ll give you two!" Sounds legit, right? Continue reading The evolution of MFA authentication technology and what needs to change next
The evolution of MFA authentication technology and what needs to change next
Authentication attacks are big business, and no one is immune from them. In fact, two men were recently arrested and charged in the Twitter employee account compromise that happened in July 2020. Using employee account credentials, the attackers took over several highly visible celebrity Twitter accounts, which were then used for bitcoin scams. Think: "If you give me one bitcoin, I’ll give you two!" Sounds legit, right? Continue reading The evolution of MFA authentication technology and what needs to change next
The evolution of MFA authentication technology and what needs to change next
Authentication attacks are big business, and no one is immune from them. In fact, two men were recently arrested and charged in the Twitter employee account compromise that happened in July 2020. Using employee account credentials, the attackers took o… Continue reading The evolution of MFA authentication technology and what needs to change next
Building for Billions: Addressing Security Concerns for Platforms at Scale
Lessons from Facebook and Google show how to safely scale your environment for security. Continue reading Building for Billions: Addressing Security Concerns for Platforms at Scale