This week’s installment of “The Friday Five” follows… providing a snapshot of recent global press coverage that demonstrates how Akamai is helping customers move Faster Forward. If you see something interesting, please share it!
- When Nelson Rodriguez talks, gamers listen
- Dealing with a (Word) pressing issue
- Necessity is the mother of invention
- Access granted
- Tom Leighton in the Land Down Under
February 2, 2017
Akamai is one of those companies that keep the internet running smoothly – without it gamers simply wouldn’t get today’s slick online experience. Marketing director for gaming Nelson Rodriguez tells MCV about his work with big publishers, how gaming is changing, and discusses game streaming R&D and AR security.
February 1, 2017
Today news broke of a particularly nasty zero day vulnerability in the Wordpress REST API. The vulnerability in this case would allow for content injection as well as privilege escalation. This vulnerability would allow an unauthenticated interloper to modify basically any content that they would see fit. Posts, pages, all fair game. This is anything but a small issue and from what I’ve read thus far, trivial to exploit by an attacker…
*Authored by Akamai Senior Security Advocate David Lewis
February 2, 2017
Is the Internet old or new? According to MIT professor of mathematics Tom Leighton, co-founder of Akamai, the internet is just getting started. His opinion counts since his firm, launched in 1998 with pivotal help from Danny Lewin SM ’98, keeps the internet speedy by copying and channeling massive amounts of data into orderly and secure places that are quick to access. Now, the National Inventors Hall of Fame (NIHF) has recognized Leighton and Lewin's work, naming them both as 2017 inductees.
“We think about the internet and the tremendous accomplishments that have been made and, the exciting thing is, it’s in its infancy,” Leighton says in an Akamai video. Online commerce, which has grown rapidly and is now denting mall sales, has huge potential, especially as dual screen use grows. Soon mobile devices will link to television, and then viewers can change channels on their mobile phones and click to buy the cool sunglasses Tom Cruise is wearing on the big screen. “We are going to see [that] things we never thought about existing will be core to our lives within 10 years, using the internet,” Leighton says.
(See also: Slice of MIT)
January 31, 2017
Akamai Technologies, Inc. has introduced Enterprise Application Access, a solution designed to provide enterprises with a new way to simplify remote and third-party application access while at the same time increasing their organization’s security posture.
Enterprise Application Access is clientless, cloud-based and easy-to-manage, and incorporates technology received as part of Akamai’s recent Soha Systems acquisition.
January 30, 2017
The head of one of the world's biggest internet infrastructure companies has warned Australians not to expect the national broadband network to bring an end to the misery of slow internet speeds.
Speaking to The Australian Financial Review on a visit to Australia, chief executive and co-founder of $US16 billion content delivery network (CDN) and cloud services giant Akamai, Dr. Tom Leighton said despite the billions of dollars invested in the NBN, Australians would still be reliant on telcos like Telstra and Optus continuing to invest in their infrastructure to head off the congestion caused by greater usage.
Akamai has a box seat watching the use of the internet, it serves up almost 30 per cent of all online content consumed globally, with its CDNs being deployed by telcos in vast data centres to store and distribute content, such as live sports coverage or TV streaming without unwatchable lag times.
February 2, 2017
Akamai, one of the service providers that helped mitigate the first of the large IoT DDoS attacks linked to Mirai malware, is sending Or Katz, one of its researchers to the conference to send a warning. “Once upon a time, the Internet of Things held unimaginable promise,” is how he describes the problem. “Then came Mirai … and all the associated attacks, and suddenly the promise seems more like a threat.”
Attackers can extort money from potential victims by threatening DDoS attacks and demanding payment to call them off. Or they might use the attacks to exact revenge against companies for perceived wrongdoing.
But DDoS attacks are just one of the uses to which adversaries can put IoT machines. They can compromise devices that are essential to manufacturing or even human health, where the well-timed attacks on a relatively few devices can damage other equipment, tie up production lines or compromise patients’ well-being.