Location- and Device-agnostic Security for the Mobile Workforce

I’ve spent my entire career in technology and can still recall the time when a desktop PC was the only way to work. (Truth be told, I’m also old enough to remember dumb terminals.) I also remember my first company laptop — a beast of a thing with a mo… Continue reading Location- and Device-agnostic Security for the Mobile Workforce

Location- and Device-agnostic Security for the Mobile Workforce

I’ve spent my entire career in technology and can still recall the time when a desktop PC was the only way to work. (Truth be told, I’m also old enough to remember dumb terminals.) I also remember my first company laptop — a beast of a thing with a monochrome display so thick it came with an integrated 2.5" floppy drive and a battery life that made it barely usable. My first mobile phone was a Motorola Timeport, the first tri-band mobile phone that could work in Europe and North America. Continue reading Location- and Device-agnostic Security for the Mobile Workforce

SolarWinds Hack and the Case of DNS Security

It’s not news that some of the top government agencies and companies in the world were victims of the SolarWinds attack. At this point, I can say it’s the reason I didn’t have a smoother transition back into work-life following a long vacation. As I un… Continue reading SolarWinds Hack and the Case of DNS Security

SolarWinds Hack and the Case of DNS Security

It’s not news that some of the top government agencies and companies in the world were victims of the SolarWinds attack. At this point, I can say it’s the reason I didn’t have a smoother transition back into work-life following a long vacation. As I understand it, the breaches happened after malicious code was inserted into a software patch that was downloaded by the companies and agencies. The installation of the patch executed malicious code, called SUNBURST, which created an entry point for other malicious codes (TEARDROP/RAINDROP). These additional codes were used to allow attackers to move laterally within the network and exfiltrate sensitive customer information to a public command and control server. Continue reading SolarWinds Hack and the Case of DNS Security

What’s New in Security, Part 2

Welcome to the Akamai Platform Update!
We’re presenting an entire week of learning about Akamai’s recent product updates. Each day, we’ll highlight our latest innovations in each area of the Akamai Intelligent Platform.
The post What’s New in Sec… Continue reading What’s New in Security, Part 2

Akamai Enhances its Cloud Secure Web Gateway with DLP, Application Control and DNS over TLS (DoT)

Last March, Akamai announced the launch of its secure web gateway delivered at the edge, to help enterprises further accelerate their transition to a new security architecture based on Zero Trust and secure access service edge (SASE) principles. As we … Continue reading Akamai Enhances its Cloud Secure Web Gateway with DLP, Application Control and DNS over TLS (DoT)

What’s New in Security, Part 2

Welcome to the Akamai Platform Update!
We’re presenting an entire week of learning about Akamai’s recent product updates. Each day, we’ll highlight our latest innovations in each area of the Akamai Intelligent Platform. Continue reading What’s New in Security, Part 2

Akamai Enhances its Cloud Secure Web Gateway with DLP, Application Control and DNS over TLS (DoT)

Last March, Akamai announced the launch of its secure web gateway delivered at the edge, to help enterprises further accelerate their transition to a new security architecture based on Zero Trust and secure access service edge (SASE) principles. As we now know, we were just on the cusp of a global pandemic that changed the nature of work. Literally overnight, companies needed to support tens of thousands of employees working from home. That meant they needed to change the way they provided application access and minimize the risk from devices that were no longer on the corporate network from being compromised with malware. The pandemic brought into sharp focus the reality that backhauling application and web traffic over a VPN to a data center with stacks of appliances to apply security was no longer viable or fit for purpose. Continue reading Akamai Enhances its Cloud Secure Web Gateway with DLP, Application Control and DNS over TLS (DoT)

Akamai, CISA, and CIS Join Forces to Improve SLTT Cyber Defenses

Cybercriminals continue to target U.S. state, local, tribal, and territorial (SLTT) government organizations. In 2019, there were more than 100 ransomware attacks — including an attack on Baltimore’s IT systems that locked out thousands of computers and disrupted nearly every city service. This attack is estimated to have cost the city as much as $18 million. Continue reading Akamai, CISA, and CIS Join Forces to Improve SLTT Cyber Defenses

Enterprise Threat Protector Now Includes One-Click Performance Optimization for Microsoft 365

Microsoft 365 is becoming the essential productivity suite for enterprises. Over 1 million companies have now signed up for the service, and every month there are more than 200 million active users. Microsoft Teams alone has 75 million active users eve… Continue reading Enterprise Threat Protector Now Includes One-Click Performance Optimization for Microsoft 365