Press Awareness 05/22/15: The Friday Five

Document created by Chris Nicholson Employee on May 26, 2015Last modified by Chris Nicholson Employee on Jun 29, 2015
Version 2Show Document
  • View in full screen mode

Friday_Five_Community.png

 

This week’s installment of “The Friday Five” follows… providing a snapshot of recent press coverage that demonstrates how Akamai is helping customers move Faster Forward. Highlights include:

 

  1. The Attack of the 50 Foot Router
  2. Everything’s Gone Green
  3. Let’s go Shopping with Jason Miller
  4. SOC it to me!
  5. Putting Lipstick on a Pig

 


Akamai report: DDoS attacks doubled in Q1 2015, SSDP top attack vector

Network World

May 20, 2015

 

Eight mega attacks were launched against Akamai customers, with the largest measuring almost 170 Gbps. "The significant increase in potential peak attack traffic suggests attackers have been developing new ways to maximize impact," Akamai said. "As more advanced, potent tools become available, unskilled adversaries could become capable of much more damaging assaults." Furthermore, with the adoption of IPv6, attacks may create a larger and potentially more effective DDoS attack surface.

 

(See also eWEEK, CSO, FierceITSecurity, Security Week, Internet Retailer, SC Magazine, SiliconWeek, Computer Sweden, The Inquirer, InfoSecurity Magazine, Computerworld India, CSO Australia)

 


Microsoft Corporation Recognizes Top Suppliers With MSP Awards

ValueWalk

May 21, 2015

 

Microsoft Corporation (NASDAQ:MSFT) acknowledged the performance of its best suppliers through the 2015 Microsoft Supplier Program (MSP) Excellence Awards on Wednesday. The MSP award is given to suppliers based on their outstanding performance, exemplary service and innovation.

 

Apart from Wipro, Zones Inc. received the 2015 Supplier Diversity Award, Sutherland Global Services was awarded the 2015 Responsible Sourcing (Bridging the Opportunity Divide Leadership Award) and Akamai Technologies won the 2015 Responsible Sourcing Award (Climate Performance Leadership Award).

 

Microsoft has thousands of third-party suppliers. The MSP awards were created by the company 13 years ago to create a strong supplier management community by acknowledging their contributions.

 

(See also: Microsoft News Center, Bloomberg, Red Orbit)

 


The Payment Conundrum of Online Shopping

Future Ready Singapore

May 19, 2015

 

The Internet has drastically changed the way we go about our daily lives from communicating to shopping. Consumers today are used to being connected across several different devices all the time. In this constantly connected world consumers expect to be able to research a product on their mobile device, order it from their desktop at work or on their tablet at home.

 

To reach on-the-go consumers, it is important for retailers to provide a seamless and efficient online shopping experience.  According to MasterCard, online shopping continues to grow steadily in Asia Pacific, growing from 81 percent in 2011 to 86.7 percent in 2014.

 

(See also BFM Radio)

 


Akamai unveils Bangalore centre as Asian cyber-attacks increase
Rapid TV News
May 21, 2015

 

"It's clear that many Asian countries continue to be a major source of cyber-attacks," said Sidharth Malik, managing director and vice president, India, Akamai Technologies. "Locating SOC resources close to the point of attack origin provides Akamai with a significant mitigation advantage. This is a proven strategy that we embrace not only in Asia, but around the world."

 

The Bangalore facility, which began operations in December 2014, adds significant bandwidth capacity and round-the-clock expertise to Akamai's global cyber defence network, the company said.

 

(See also India Tech, Telecompaper, VAR India, InfoTech Lead)

 


*Mobilizing SQL Injection Attacks: Same Pig, New Lipstick?

Security Ledger

May 22, 2015

 

In the past years we have seen an increase in distributed attacks against web applications. By using many attacking resources to target the same destination, attackers are obscuring their identity while boosting attack bandwidth, placing a greater challenge to defensive forces. Most of the distributed attacks use “volumetric” methods such as Distributed Denial of Service (DDoS) or brute force techniques such as “slow and low” to attack web applications.

 

The most prevalent way to execute these kinds of distributed attacks is by using a remote attacker who controls botnet members or re-routing traffic through open proxies. In both cases the attacker is trying to hide the origin of the attack against the targeted application from the intended victims.

 

But recently Akamai’s Threat Research Team uncovered a distributed attack campaign that differs from the common distributed attack model described above in two important aspects.

 

*Authored by Akamai’s Or Katz

Attachments

    Outcomes