Akamai

October 25, 2018
How Can You Protect the Mid-Terms and Secure Election Networks in Minutes? premium
With the mid-term elections looming, protecting the integrity of our most basic democratic right has become a matter of critical importance.  According to the Electronic Frontier Foundation, a nonprofit organization dedicated to defending civil liberties in a digital world, election security remains just as vulnerable as in 2016 and encourages Secretaries of State to be […]
premium
andre.jones@dlt.com'
March 7, 2018
SaaS Offering Simplifies Remote Application Access Control, Reduces Attack Surface premium
Ransomware tops today’s list of security concerns for governments, and no agency is immune. Just look at the statistics: • Cook County, Chicago was a victim of last year’s WannaCry ransomware attack. • St. Louis Public Library was hit with ransomware, demanding $35,000 in Bitcoin. • Bingham County, Idaho paid out #3,000 in ransomware to […]
premium
qa@dlt.com'
July 3, 2017
Don’t Pay the Ransom: How to Protect your Networks Against Petya premium
Another nameless, faceless adversary (or as the U.S Army calls them “the enemy with no face”) struck again in the last week of June. Hot on the heels of WannaCry attack in May, the Petya ransomware campaign brought widespread disruption to organizations, government agencies, and infrastructure worldwide. Like WannaCry, the ransomware targets Windows systems, encrypts […]
premium
jeremy.young@dlt.com'
Vice President of Cybersecurity
February 25, 2015
Let’s Hear it for our “Magic Quadrant” Vendor Partners premium
Proof of performance is a key criterion for any government decision maker when reviewing potential vendors and bidders. One such “proof” is recognition from industry analysts, and perhaps the most sought after of these is to be positioned (and ranked highly) in Gartner’s Magic Quadrant reports. The Gartner Magic Quadrant is a graphical portrayal of […]
premium
steven.wilder@dlt.com'
February 9, 2015
Denial of Service Attacks Rise (“Internet of Things” Vulnerable) premium
With all the noise and hubbub around insider threats and data hacks, it’s easy to ignore that other threats persist. Most notably, denial-of-service (DDoS) attacks. DDoS occur when cyber criminals make a machine or network resource unavailable to its intended users. The problem is that DDoS attacks are thriving. There were nearly twice as many […]
premium
editor@acronymonline.org'
Akamai Government Forum 2014: Threat Landscape premium
The Akamai Government Forum 2014 event helped customers dive deep into the efficiencies of moving to the cloud and innovations in cybersecurity. Below are the two questions I found most interesting along with summarized answers given by R.H. and Mike.
premium
julie.urban@dlt.com'
April 29, 2013
Technically News – 4/29 premium
In this week's Technically Speaking: DDoS Attacks Triple in 2012; Amazon Cloud Adds Protection Against DoS Attacks; Two States Overhaul IT to Boost Social Services; Six Open Source Security Myths Debunked; A Checklist for Keeping Mobile Apps Secure.
premium
NewsJosh@dlt.com'