Authentication: Lessons Learned from Microsoft Exchange and F5 BIG-IP Hacks

The past month has been a very dynamic time in the world of security for hackers and threat researchers, but it has been an extended nightmare for CSOs responsible for securing their enterprise networks.
The post Authentication: Lessons Learned from Mi… Continue reading Authentication: Lessons Learned from Microsoft Exchange and F5 BIG-IP Hacks

Authentication: Lessons Learned from Microsoft Exchange and F5 BIG-IP Hacks

The past month has been a very dynamic time in the world of security for hackers and threat researchers, but it has been an extended nightmare for CSOs responsible for securing their enterprise networks. Continue reading Authentication: Lessons Learned from Microsoft Exchange and F5 BIG-IP Hacks

Microsoft Exchange and Verkada Hacks: Isolate Your Apps and APIs from the Internet Cesspool

It’s been an interesting start to March in terms of public security incidents. This month kicked off with multiple zero-day exploits being used to attack on-premises versions of Microsoft Exchange Server. And, as if that wasn’t enough, that attack was quickly followed by the news that a hacktivist "collective" calling itself APT-69420 claims to have breached the internal systems of the Silicon Valley firm Verkada. That particular breach has garnered widespread press coverage as the group claims to have gained access to live video feeds from more than 150,000 surveillance cameras. Continue reading Microsoft Exchange and Verkada Hacks: Isolate Your Apps and APIs from the Internet Cesspool

Microsoft Exchange and Verkada Hacks: Isolate Your Apps and APIs from the Internet Cesspool

It’s been an interesting start to March in terms of public security incidents. This month kicked off with multiple zero-day exploits being used to attack on-premises versions of Microsoft Exchange Server. And, as if that wasn’t enough, that attack was … Continue reading Microsoft Exchange and Verkada Hacks: Isolate Your Apps and APIs from the Internet Cesspool

2020 DDoS Extortion Campaign — A Sequel More Thrilling Than the Original

As you might imagine, as the go-to enterprise DDoS mitigation experts, our phones have been "ringing off the hook" as the global extortion DDoS campaign sequel rages on. It’s bigger, badder, and features a broader cast of criminal characters than seen previously with last year’s extortion-related activity. Continue reading 2020 DDoS Extortion Campaign — A Sequel More Thrilling Than the Original

2020 DDoS Extortion Campaign — A Sequel More Thrilling Than the Original

As you might imagine, as the go-to enterprise DDoS mitigation experts, our phones have been "ringing off the hook" as the global extortion DDoS campaign sequel rages on. It’s bigger, badder, and features a broader cast of criminal characters th… Continue reading 2020 DDoS Extortion Campaign — A Sequel More Thrilling Than the Original

Akamai Named Gartner Magic Quadrant Leader for Fourth Consecutive Year

Gartner published its 2020 Magic Quadrant for Web Application Firewalls (WAF) and named Akamai a Leader for the fourth consecutive year. Gartner’s high distinction is market recognition of our completeness of vision and ability to execute. Continue reading Akamai Named Gartner Magic Quadrant Leader for Fourth Consecutive Year

Better Together: Akamai Enhances Zero Trust Network Access with CrowdStrike

More than ever before, users and applications no longer reside at the office. Organizations are managing a mobile and globally distributed workforce that needs access to corporate systems, applications, and data from outside the traditional network per… Continue reading Better Together: Akamai Enhances Zero Trust Network Access with CrowdStrike

Better Together: Akamai Enhances Zero Trust Network Access with CrowdStrike

More than ever before, users and applications no longer reside at the office. Organizations are managing a mobile and globally distributed workforce that needs access to corporate systems, applications, and data from outside the traditional network perimeter. In addition, cyberattackers are exploiting this situation with an increase in malware and phishing attacks aimed at remote workers. Continue reading Better Together: Akamai Enhances Zero Trust Network Access with CrowdStrike

Rethinking Defensive Strategy at the Edge, Part 3: Strategies for Protective Action

Our three-part blog series, Re-thinking Defensive Strategy at the Edge, has been focusing on outlining a new defensive edge strategy for today’s enterprise. We began with a discussion of data and indicators. Most recently, our second post focused on using risk signals and correlating them for improved security controls. This last post in the series will transition the discussion from data and correlation into how to use these to enable adaptive actionable protection strategies. Continue reading Rethinking Defensive Strategy at the Edge, Part 3: Strategies for Protective Action