Sustainability Requires Collaboration: Akamai’s Growing Community and Supply Chain Initiatives

Akamai is committed to collaboration that inspires worldwide change. We know it’s not enough to be environmentally conscious solely in our own business. To make a true impact on climate change, we need to use our unique position as a global corporation… Continue reading Sustainability Requires Collaboration: Akamai’s Growing Community and Supply Chain Initiatives

Sustainability Requires Collaboration: Akamai’s Growing Community and Supply Chain Initiatives

Akamai is committed to collaboration that inspires worldwide change. We know it’s not enough to be environmentally conscious solely in our own business. To make a true impact on climate change, we need to use our unique position as a global corporation to encourage our partners to join us in taking sustainable action, participating in community improvement projects, and engaging in climate education. We need to consider the question: "How much more can we do for the betterment of the environment with help from our stakeholders?" Continue reading Sustainability Requires Collaboration: Akamai’s Growing Community and Supply Chain Initiatives

Working Together with Our Customers to Build a Sustainable Future

By now, we hope you’ve read Monday’s and Tuesday’s blog posts announcing the release of our annual sustainability report, our sustainability program, and the technical innovation behind it. Continue reading Working Together with Our Customers to Build a Sustainable Future

Survey of Supply Chain Attacks

The Atlantic Council has a released a report that looks at the history of computer supply chain attacks. Key trends from their summary: Deep Impact from State Actors: There were at least 27 different state attacks against the software supply chain including from Russia, China, North Korea, and Iran as well as India, Egypt, the United States, and Vietnam.States have… Continue reading Survey of Supply Chain Attacks

Securing the International IoT Supply Chain

Together with Nate Kim (former student) and Trey Herr (Atlantic Council Cyber Statecraft Initiative), I have written a paper on IoT supply chain security. The basic problem we try to solve is: how to you enforce IoT security regulations when most of th… Continue reading Securing the International IoT Supply Chain

Securing the International IoT Supply Chain

Together with Nate Kim (former student) and Trey Herr (Atlantic Council Cyber Statecraft Initiative), I have written a paper on IoT supply chain security. The basic problem we try to solve is: how to you enforce IoT security regulations when most of the stuff is made in other countries? And our solution is: enforce the regulations on the domestic company… Continue reading Securing the International IoT Supply Chain

Security Vulnerabilities in Android Firmware

Researchers have discovered and revealed 146 vulnerabilities in various incarnations of Android smartphone firmware. The vulnerabilities were found by scanning the phones of 29 different Android makers, and each is unique to a particular phone or maker. They were found using automatic tools, and it is extremely likely that many of the vulnerabilities are not exploitable — making them bugs… Continue reading Security Vulnerabilities in Android Firmware

Adding a Hardware Backdoor to a Networked Computer

Interesting proof of concept: At the CS3sthlm security conference later this month, security researcher Monta Elkins will show how he created a proof-of-concept version of that hardware hack in his basement. He intends to demonstrate just how easily spies, criminals, or saboteurs with even minimal skills, working on a shoestring budget, can plant a chip in enterprise IT equipment to… Continue reading Adding a Hardware Backdoor to a Networked Computer