Wednesday, Aug 18th, 10:30 AM – 12:00 PM Vietnam Time Zone
DNS is a standard and necessary technology in today’s world, and is the most basic requirement to do business online. Because of its criticality to the Internet, DNS services are frequently targeted by criminals intending to cause damage to websites, web applications, users, the network and sometimes these outages can also occur organically. When your DNS is compromised, your brand is too.
Criminals today also leverage DNS vulnerabilities to launch Phishing attacks which are becoming increasingly common and their impact more severe. As we continue to operate remotely, organizations must ensure they are aware of the evolution of such attack vectors, and what countermeasures are available.
In our first security briefing in this series, we will:
Friday, Aug 20th, 10:30 AM – 11:45 AM Vietnam Time Zone
80% of security breaches involve compromised credentials. And while password hygiene is culpable in part, even complex, indecipherable passwords developed by algorithms can be problematic. A recent dark web audit revealed 15 billion stolen logins from 100,000 breaches.
The global pandemic has pressured the situation further as users are no longer operating within the corporate network perimeter. They are exposed to multiple authentication attack vectors such as credential stuffing, password spray and other brute-force mechanisms, local discovery and insider efforts, phishing and social engineering, keystroke logging, malicious proxy and reply campaigns.
We’ve put together a briefing to share our top learnings from ZTNA deployments globally.
In the third briefing of the series, we will:
In the first session of this series we touched upon the scale of the Akamai platform. Why is the expanse and depth of our platform important?
Up to 30% of the total web traffic today is on the Akamai platform, over 50% of the world’s recursive DNS queries are resolved by Akamai (2.2 trillion queries daily). This unprecedented visibility provides insights into DNS and IP traffic that inform our customers’ Security Operations teams. Over the last several years, Akamai’s threat research team has developed a security stack based primarily off of Akamai proprietary algorithms to detect real, current & accurate threats stemming from Akamai’s Carrier grade Recursive DNS and Web Proxy networks.
Akamai’s Enterprise Threat Intelligence is a platform that allows organizations’ Threat Intelligence and Security Operations to directly query Akamai’s Domain, URL and Hash risk severity via open API and automatic integration via MISP.
In this final briefing of the series, we will: