This week’s installment of “The Friday Five” follows… providing a snapshot of recent press coverage that demonstrates how Akamai is helping customers move Faster Forward. Highlights include:
- Why won’t RIPv1 R.I.P? – Redux
- Give me an “I”… Give me an “O”… Give me a “T”
- Cyber resilience in a world without borders
- Mani Sundaram tells credit unions what they need to know
- Talkin’ enterprise mobility with Jason Hatch
July 6, 2015
Attackers are exploiting an ancient networking protocol to enslave small home and office routers in distributed denial of service attacks, Akamai says.
The May attacks, described in a report by the global networking company, exploit routers operating version one of the Routing Information Protocol (RIP) developed in 1988 and superseded by version two in 1996.
Net pests are generating 12.8Gbps DDoS attacks from some 500 enslaved routers, but have the potential to scale upwards if they target more of the 24,212 exposed devices found vulnerable, Akamai's PLXsert unit says.
July 7, 2015
CIOs planning to provide the systems -- or form the right partnerships -- for their companies' Internet of Things (IoT) projects might want to take a few pointers from Kris Alexander, chief strategist of gaming and connected devices at Akamai Technologies Inc. The Cambridge, Mass.-based cloud services provider, which accounts for between 15% and 30% of all web traffic, is well known for delivering large content files to consumers. But as connected devices proliferate, Akamai is becoming a force in its customers' IoT projects.
Last May, Akamai provided complimentary service to IoT and wearable startups at the Wearable World Congress. And last month at a Massachusetts Technology Leadership Council IoT event, Alexander said its customers are increasingly turning to Akamai for IoT help. The potential business opportunity is a logical one: Customers such as automobile manufacturers might use Akamai to distribute software updates to vehicles. Now, they're asking Akamai to provide services in the opposite direction -- collecting sensor data emitted by cars for proactive maintenance and service, he said.
July 6, 2015
Cyber resilience means implementing a level of preparedness and ability to respond and adapt to events that threaten an organization’s ability to meet its operational objectives – whether it’s a DDoS attack or a data breach. Understanding the real risks companies are faced with in today’s world – decoding the facts from fiction that the media flash at us every day – is the first step.
Organizations also need to develop a holistic approach to architecting a resilient environment, throughout the full organization, which can then cope with any situation, irrespective of what is thrown at it. This approach takes the conversation away from a specific set of technologies countering specific threats, but a design goal / philosophy that talk about a resilient business and technology operations.
*Authored by Akamai’s Director, Enterprise Security APJ, John Ellis
(See also My Broadband)
Credit Union Times
July 7, 2015
The banking and financial services industries have always been one of the primary targets for high-profile attacks. The motivation is blatantly obvious – to cripple an institution’s website, steal critical customer data and, of course, for reap the financial benefits. Recent attacks, such as Yummba and Zeus, have only reinforced the notion that malware and DDoS developers have a keen interest in the industry – and this does not just include the large, global institutions, this includes smaller banks and credit unions, too.
The fallout from these attacks is significant, and clashes with the ultimate goal for any financial institution: To provide a convenient experience that instills trust and encourages long-term customer loyalty. According to Financial Publishing Services, data shows that banks are losing customers at an average of 12.5 percent each year – for reasons that include poor customer experiences and poor security. This is an alarming statistic, especially for credit unions that are working within small geographic locations and have more to lose.
*Authored by Akamai’s Vice President, Global Services, Mani Sundaram
July 8, 2015
"Organisations need to take a holistic approach towards enterprise mobility, including optimised Web performance, seamless transaction processes for multiple devices and robust backend systems," says Hatch. "This will help them manage, mine, protect, and draw insights from consumer behaviour and buyer data while ensuring optimum security for the enterprise, its employees and its customers."
This wide-ranging interview also includes Big Data Analytics (BDA), security & privacy concerns, as well as the Internet of Things (IoT).
July 10, 2015
So during those early months, working side by side with the tech surge, MPL began to improvise. They figured out that they could use Akamai, a cloud provider that already had the government's blessing, to launch static websites that handled complex functions in the user's browser, rather than on an exterior server. The team successfully created a page that let users create new accounts on Healthcare.gov, replacing one of the most buggy parts of the site.