Akamai Cloud Security Solutions: Comparing Approaches for Web, DNS, and Infrastructure Security

| December 19, 2017

article image
Organizations today operate in a Faster Forward world. Over three billion people are connected to the Internet, often through multiple computing devices. People are spending a growing portion of their lives online  communicating, shopping, being entertained, and working. For both business and government organizations, this represents a significant shift in how they engage with theircustomers and employees. For these organizations, more of their daily activities now take place outside of the traditional office. They engage with customers and collaborate with coworkers over the Internet, performing financial transactions, transmitting sensitive business data, and communicating over public networks.

Spotlight

Total Defense™

Total Defense provides powerful protection from evolving online threats. Total Defense solutions include anti-malware, anti-virus, intrusion prevention & mobile security, protecting more than 4 million consumers and their devices worldwide.

OTHER ARTICLES

Understand the role of infrastructure as code in DevOps

Article | February 28, 2020

Infrastructure as code plays a prominent role in enterprise DevOps shops. Use this chapter excerpt to understand why -- and to learn the basics of some common IaC tools. As technology evolves at a faster and faster pace, collaboration between teams, such as development and IT operations, becomes increasingly important to satisfy end user and business demands. DevOps aims to foster that collaboration, as well as improve application deployment times and quality. To succeed with DevOps, however, IT teams must be open to change. "DevOps is a culture different from traditional corporate cultures and requires a change in mindset, processes, and tools," writes Mikael Krief in the book Learning DevOps: The complete guide to accelerate collaboration with Jenkins, Kubernetes, Terraform and Azure DevOps.

Read More

We Need to Talk About ‘Cloud Neutrality’

Article | February 10, 2020

We spent a lot of years talking about net neutrality the idea that the companies that provide access to the internet shouldn’t unfairly block, slow down, or otherwise interfere with traffic even if that traffic competes with their services. But there’s an even bigger issue brewing, and it’s time to start talking about it: cloud neutrality. “While its name sounds soft and fluffy,” Microsoft president and general counsel Brad Smith and coauthor Carol Ann Browne write in their recent book, Tools and Weapons: The Promise and the Peril of the Digital Age, “in truth the cloud is a fortress.” Their introduction describes the modern marvel of the data center: a 2 million-square-foot, climate-controlled facility made up of colossal electrical generators, diesel fuel tanks, battery arrays, and bulletproof doors

Read More

Was Your IT Infrastructure Ready for COVID-19?

Article | April 7, 2020

Lockdowns, quarantines, travel bans, restrictions on social life and more. The world is facing one of its biggest challenges right now, something that was predicted multiple times in the past, but something no one paid much attention to until now. The impact on our future life is still up in the air, but what about IT? I have been asking clients and colleagues “What is the real impact of COVID-19 on your IT infrastructure?” for a couple of weeks now, while also trying to get a grasp on what is really happening to both IT professionals and the IT vendor community. While my focus is on data storage, I’m pretty sure that a similar analysis of other areas of IT will lead to the same conclusions. Here is a very basic example.

Read More

New Ransomware Targets Critical Infrastructure in 2020

Article | March 31, 2020

Critical infrastructure, like power and water systems, face a number of cyber-security threats. Traditional ransomware variants can bring these systems down by encrypting files that are vital to their operation. However, a new variant poses an even greater risk to critical infrastructure. The Ekans ransomware is designed specifically to take down critical services, making anti-ransomware protection even more important in these environments. Ransomware is a well-known threat made famous by the WannaCry worm. The success of the 2017 WannaCry outbreak has inspired a rash of attacks and new ransomware variants in recent years.

Read More

Spotlight

Total Defense™

Total Defense provides powerful protection from evolving online threats. Total Defense solutions include anti-malware, anti-virus, intrusion prevention & mobile security, protecting more than 4 million consumers and their devices worldwide.

Events