4 Critical Elements Your Next Security Solution Must Have

Security is essential to the success of any digital business. But there’s one thing you can always count on: security-related incursions are inevitable. And the results can be devastating. Security breaches erode trust and damage reputation. To help, we’ve compiled Security Starts at the Edge: The 2019 Security Buyer’s Guide to help you find the right security solution for your business. Access the guide here for a deeper dive. But first, consider the standard (but critical) elements your new solution must provide. Continue reading 4 Critical Elements Your Next Security Solution Must Have

3 Reasons Your Business Needs Security at the Edge

Security at the edge is an approach to defending your business from security threats by deploying defense measures closer to the point of attack and as far away from your assets (your people, applications, or infrastructure) as possible.
The post 3 Rea… Continue reading 3 Reasons Your Business Needs Security at the Edge

Akamai Is Named A Leader In Gartner’s Magic Quadrant For Web Application Firewalls

"Don’t work for recognition, but do work worthy of recognition" – H. Jackson Brown. A friend sent this quote to me after I explained to her my ambivalence about being recognized by Gartner as a "Leader" in their Web Application… Continue reading Akamai Is Named A Leader In Gartner’s Magic Quadrant For Web Application Firewalls

Akamai Is Named A Leader In Gartner’s Magic Quadrant For Web Application Firewalls

"Don’t work for recognition, but do work worthy of recognition" – H. Jackson Brown. A friend sent this quote to me after I explained to her my ambivalence about being recognized by Gartner as a "Leader" in their Web Application… Continue reading Akamai Is Named A Leader In Gartner’s Magic Quadrant For Web Application Firewalls

Akamai SIRT details a timeline of DDoS campaigns against MIT

Akamai SIRT has published a new case study detailing a series of DDoS attack campaigns against the MIT (Massachusetts Institute of Technology) network. So far in 2016, MIT has received more than 35 DDoS campaigns against several different targets which… Continue reading Akamai SIRT details a timeline of DDoS campaigns against MIT

Q1 2016 SOTI Security Preview: Reflection DDoS Attacks, Q1 2015-Q1 2016

By Akamai SIRT Two quarters ago, we introduced Sankey diagrams to the State of the Internet: Security Report. Sankey graphs help visualize energy, material, or cost transfers between processes. The Sankey graph below shows how DDoS reflection attacks have trended… Continue reading Q1 2016 SOTI Security Preview: Reflection DDoS Attacks, Q1 2015-Q1 2016

Q1 2016 SOTI Security Report: Retail Takes Brunt of Web App Attacks

By Bill Brenner, Senior Tech Writer, Akamai SIRT Retail was hit hard in Q1 2016 by malicious actors who targeted the business sector with web application attacks. That is among the findings in the State of the Internet Security Report… Continue reading Q1 2016 SOTI Security Report: Retail Takes Brunt of Web App Attacks