AKAMAI – Bảo mật môi trường làm việc cho tương lai
24/08/2021Bảo vệ website toàn diện với Dịch vụ đánh giá an ninh Website
27/08/2021Dissecting Recent Ransomware Attacks & DNS Security with Live Demonstration
Wednesday, Aug 18th, 10:30 AM – 12:00 PM Vietnam Time Zone
DNS is a standard and necessary technology in today’s world, and is the most basic requirement to do business online. Because of its criticality to the Internet, DNS services are frequently targeted by criminals intending to cause damage to websites, web applications, users, the network and sometimes these outages can also occur organically. When your DNS is compromised, your brand is too.
Criminals today also leverage DNS vulnerabilities to launch Phishing attacks which are becoming increasingly common and their impact more severe. As we continue to operate remotely, organizations must ensure they are aware of the evolution of such attack vectors, and what countermeasures are available.
In our first security briefing in this series, we will:
- Share reference architectures on why the core of your security strategy needs to start with holistic DNS security – Authoritative and Recursive DNS
- Outline top considerations to address in your existing or future DNS implementations and service provider
- Simulate a LIVE DEMONSTRATION of how attackers are using advanced phishing methods with real-life examples of recently deployed hacking method and how you can be better prepared to handle such threats
- Share insights and perspectives on other recent attacks such as ransomware
Top Learnings from Zero Trust Network Access (ZTNA) Deployments:
Friday, Aug 20th, 10:30 AM – 11:45 AM Vietnam Time Zone
Today’s MFA – is it a Security Illusion?:
Tuesday, Aug 24th, 10:30 AM – 11:45 AM Vietnam Time Zone
80% of security breaches involve compromised credentials. And while password hygiene is culpable in part, even complex, indecipherable passwords developed by algorithms can be problematic. A recent dark web audit revealed 15 billion stolen logins from 100,000 breaches.
The global pandemic has pressured the situation further as users are no longer operating within the corporate network perimeter. They are exposed to multiple authentication attack vectors such as credential stuffing, password spray and other brute-force mechanisms, local discovery and insider efforts, phishing and social engineering, keystroke logging, malicious proxy and reply campaigns.
We’ve put together a briefing to share our top learnings from ZTNA deployments globally.
In the third briefing of the series, we will:
- Discuss today’s standard push MFA services work and how attackers can bypass these.
- Showcase how the FIDO2 standard prevents MFA bypass attacks – a Phish-proof MFA.
- Walkthrough Akamai’s next gen Phish-proof MFA service at the Edge
Advanced Threat Intelligence for Security Operations Teams:
Thursday, Aug 26th, 10:30 AM – 12:00 PM Vietnam Time Zone
In the first session of this series we touched upon the scale of the Akamai platform. Why is the expanse and depth of our platform important?
Up to 30% of the total web traffic today is on the Akamai platform, over 50% of the world’s recursive DNS queries are resolved by Akamai (2.2 trillion queries daily). This unprecedented visibility provides insights into DNS and IP traffic that inform our customers’ Security Operations teams. Over the last several years, Akamai’s threat research team has developed a security stack based primarily off of Akamai proprietary algorithms to detect real, current & accurate threats stemming from Akamai’s Carrier grade Recursive DNS and Web Proxy networks.
Akamai’s Enterprise Threat Intelligence is a platform that allows organizations’ Threat Intelligence and Security Operations to directly query Akamai’s Domain, URL and Hash risk severity via open API and automatic integration via MISP.
In this final briefing of the series, we will:
- Share the various sources of the data and how this intelligence can be used by Security Operations teams
- Outline some of the major threats that we’ve been able to identify
- The available mitigation techniques that customers could leverage from Akamai’s Enterprise Security offering
- Showcase examples of how this intelligence is being leveraged by our customers