Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Akamai is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company's solutions is the Akamai Intelligent Platform providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud.

To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit or, and follow @Akamai on Twitter.

Our Website:

Whitepaper: 2019 State of the Internet / Security: Phishing - Baiting the Hook

by AkamaiOct 30, 2019

Phishing isn't a new phenomenon. Since the early days of the Internet, nefarious actors have been impersonating people and businesses in order to first gain your trust, and then your personal information. Now that the Internet is more prevalent in our lives, attackers are getting savvier, making their phishing attacks more sophisticated so that we still fall for them - no matter how aware we are.

Phishing attacks require two things: a lure and a landing. Download this installment of the Akamai 2019 State of the Internet (SOTI) report to explore virtually every aspect of phishing, including:

• The basics of phishing as it has evolved over the years
• The development cycle used by phishing kit creators
• The growth of phishing as a service

The latest SOTI report digs deeper into a few examples of how the phishing economy works, and how users and businesses can take steps to protect themselves against the ever-evolving threat of phishing. This style of attack is not one-size-fits-all, so users and businesses must continue to do due diligence to stay one step ahead of criminals looking to misuse their social trust.

Research Report: 2019 State of the Internet / Security: Media Under Assault

by AkamaiOct 18, 2019

From January 2018 through June 2019, Akamai recorded more than 61 billion credential stuffing attempts and more than 4 billion web application attacks. In this special edition of the State of the Internet / Security Report, we're focusing on data within the high tech, video media, and entertainment sectors — collectively named Media & Technology.

These three industries accounted for nearly 35% of all credential stuffing attacks, and almost 17% of the web application attacks seen by Akamai during the 18-month reporting period. Our analysis indicates these three verticals are a stable and consistent attack source for two reasons: personal and corporate data. The targeted brands are household names, and criminals are looking to capitalize on that familiarity.

By attacking directly via web application attacks, criminals hope to expose customer records and financial data or leverage a vulnerable server to spread malicious code — also a common motive driving criminals to attack the retail sector. Credential stuffing abuses the brands targeted, as well as their customers, enabling the criminals to target personal information and corporate assets, such as media or digital products.

Whitepaper: The 2019 Security Buyer’s Guide

by AkamaiOct 17, 2019

Security is the foundation of digital business innovation.

It's a bold claim; one that hasn't always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone.

Security is essential to the success of any digital business. If there is one thing you can always count on, however, it's that security-related incursions are inevitable. And it's news to no one to say that these disruptions can have dire consequences beyond downtime. Security breaches erode trust and damage reputation.

Simply put, there's no longer a choice. As a CIO, CISO, or other security or IT leader, you know it's your job to be the central agent stressing the connections between business and digital risk. It's your responsibility to find the talent and technology to ensure the protection of your digital assets.

According to Gartner, by 2020, 100% of large enterprises will be asked to report on their cybersecurity and technology risks to their boards of directors at least annually. That's up from 40% in 2018. Whether you're a leader of a large enterprise or a smaller business, part of your ongoing security, risk management, and compliance strategy will be sourcing the most effective security solution for your business.

We know. Easier said than done. To help, we've compiled this guide for you to find the right solution for your business to scale resilience, build trust, and drive revenue.

Whitepaper: 2019 State of the Internet / Security: Financial Services Attack Economy

by AkamaiAug 28, 2019

The financial services industry has always been a prime target for criminals. The tools used to attack financial organizations are part of an increasingly large and sophisticated criminal ecosystem. This may seem like an obvious statement at first glance. When you read industry reports, they tend to focus on a single aspect of the whole ecosystem, as if it were unrelated to other types of attacks.

We wanted to do something different for this report. In our latest State of the Internet / Security report, we study criminal behavior across this advanced and expansive financial services attack economy: from a popular authentication mechanism for staging credential stuffing attacks to the use of stolen identities to cash out ill-gotten gains. This report identifies leading DDoS and application-layer attack vectors, lucrative phishing variants, and how criminal stage decoy attacks to distract from their real targets. Attacks that prove successful in financial services often move on to other industries.

Whitepaper: State of the Internet: Web Attacks and Gaming Abuse

by AkamaiJun 20, 2019

This installment of the State of the Internet / Security examines credential stuffing and web application attack trends over the last 17 months, with a focus on the gaming industry. One reason gaming is so lucrative is the trend of adding easily commoditized items for gamers to consume, such as cosmetic enhancements, special weapons, or other related items. Gamers are also a niche demographic known for spending money, so their financial status makes them tempting targets.

Attackers see credential abuse as a low-risk venture with potential for a high payout, at least for now. These types of attacks are more likely to increase for the foreseeable future. As with many other types of attacks, the important thing is for security professionals to be aware that the attacks are happening so we can find ways to defend our enterprises against them.

Whitepaper: From the Core to the Edge: 7 Reasons You Need Security at the Edge

by AkamaiMay 01, 2019

Digital security has never taken on greater urgency. Today we live in a fundamentally connected ecosystem where we increasingly work, play, and live online. What's more, the attack surface is always shifting and continues to disperse across a wider area. At the same time, attacks continue to grow in size and volume, and are increasingly targeted. No longer can you secure the perimeter and trust that nothing will get in or out. Security is being redefined right before your eyes. That's why you need to take security to the edge.

Whitepaper: Everything You Always Wanted to Know About Security at the Edge But Were Afraid to Ask

by AkamaiMay 01, 2019

Business depends on flawless digital experiences. This is true for the enterprise -- to communicate, collaborate, and produce at the highest level. And it's true of core business offerings like seamless online retail and financial transactions, OTT video delivery, online healthcare portals, and for connected devices on the manufacturing floor. The problem is, the secure perimeter as we know it is dissolving. So how do you protect your crown jewels when the castle has no walls? The answer is to deploy security at the edge, where you can protect your assets closer to the attack itself while moving digital experiences closer to ours.