Akamai Gives Insight on Global Cloud Security, Releases Q2 2015 Report
CAMBRIDGE, MA: With an aim to provide analysis and insight into the cloud security landscape, Akamai Technologies, provider of Content Delivery Network (CDN) services, has made public its Q2 2015 State of the Internet- Security Report to help enterprises deal with cyber attacks.
Q2 2015 State of the Internet- Security Report is released preceding its Q1 2015 and Q2 2014 reports. It provides minute details about broadband adoption metrics, connection speeds, IPv4 exhaustion, notable Internet disruptions and IPv6 implementation. It also indicates the increasing number of attacks from the last two reports and says that there were 12 attacks peaking at more than 100 Gigabits per second (Gbps) and five attacks peaking at more than 50 Mn packets per second (Mpps).
In addition, the report provides specified analysis of Distributed Denial of Services (DDoS), which refers to an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources, and web application attack trends, attack frequency and sources, which consists analysis of two additional attack vendors: Shellshock and cross-site scripting, and spotlight: 100 Gbps + mega attacks.
“The threat posed by DDoS and web application attacks continues to grow each quarter. Malicious actors are continually changing the game by switching tactics; seeking out new vulnerabilities and even bringing back old techniques that were considered outdated. By analyzing the attacks observed over our networks, we’re able to identify emerging threats and trends and provide the public with the information to harden their networks, websites and application and improve their cloud security profiles,” says John Summers, VP of Cloud Security Business Unit, Akamai.
According to the report, SYN and Simple Discovery Protocol (SSDP) were the most common DDoS attack vectors this quarter- each accounting for around 16 percent of DDoS attack traffic. The survey has also found that online gaming has been the favorite target of attackers since Q2 2014.
By John Kamin, EVP and CIO, Old National Bancorp
By Gregg T. Martin, VP & CIO, Arnot Health
By Dave Doyle, CIO & SVP, IT, Regal Entertainment Group
By Sergey Cherkasov, CIO, PhosAgro
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Mike Fitton, Wireless Business Unit Director, Altera
By Jim Kaskade, VP and GM, Big Data & Analytics, CSC
By Thomas Musgrave, EVP & CIO, AmeriCold Logistics
By Vin Sharma, Director, Strategic Planning & Marketing, Big...
By Federico Flórez, Chief Information & Innovation Officer,...
By Barbara Adams, VP, Innovative Technology Solutions, Texas...
By John Mason, CIO, Bottomline Technologies
By Jamshid Khazenie, CTO, USA Today Network / Gannett
By Miguel Gamino, CIO & Executive Director-Department of...
By Bill Schimikowski, VP, Customer Experience, Fidelity...
By Tom Bressie, Vice President, Oracle Cloud
By John Landwehr, Public Sector CTO, Adobe
By Aaron Gette, CIO, The Bay Club Company
By Denise Zabawski, CIO, Nationwide Children's Hospital
By Amit Bahree, Executive, Global Technology and Innovation,...