Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analytics.

Filter the library by ...
CLEAR

Build a Data Privacy Organization That Balances Marketing Innovation and Customer Expectations

Privacy management oversight and coordination is a business imperative for B2C brands. CCPA, GDPR, and other data privacy regulations have expanded the definition of personally identifiable information (PII) and empowered consumers with greater control over their data, where it’s stored, and how it’s used.

GDPR, CCPA, and Beyond

Fueled by well-publicized data breaches, identity theft, and related scandals, consumer privacy legislation is being rapidly enacted across the globe. The European Union’s GDPR launched in 2018, and the California Consumer Privacy Act (CCPA) becomes law on January 1, 2020. These two high-profile data privacy laws are the tip of the iceberg as dozens of other countries and states pursue similar legislation. At the center of data privacy regulations are the consumer identities businesses store.

5 Reasons Enterprises Need a New Application Access Model

The average cost of a breach is $3.86 million. With so much at stake, why do so many enterprises grant access based on an outdated model of assumed trust? And why do businesses rely on antiquated access technologies such as traditional VPNs and remote proxies to provide this application access?

Beyond SD-WAN: Zero Trust Security and the Internet as Corporate WAN

While SD-WAN currently enables the corporate network to handle traffic efficiently and move workloads to the cloud, this network model must continue to iterate. The Internet is the corporate WAN of the near future. Using SD-WAN, combined with the appropriate Zero Trust–compliant security and access services, is the first step to transitioning to the Internet as the corporate network.

Enforce a Zero Trust Security Model in Today's Hostile Environment

Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.

How to Guide: Zero Trust Security Transformation

A Zero Trust model ensures that security and access decisions are dynamically enforced based on identity, device, and user context. This security framework dictates that only authenticated and authorized users and devices can access applications and data, while also protecting workloads and users from advanced threats.

Phishing is No Longer Just Email: It’s Social

Despite years of publicity and millions of dollars in employee training, phishing remains the largest insider threat that organizations face. As many as 93% of IT security breaches are the direct result of some form of phishing, and 34% of all phishing attacks explicitly target enterprises. Employees unwittingly give up personal and corporate information to malicious actors every day.

State of the Internet: Financial Services Attack Economy

Phishing is a well-known attack vector in the financial and security industry space. The data shows that, in addition to unique phishing attempts, adversaries also leveraged credential stuffing attacks to the tune of 3.5 billion attempts during an 18-month period, putting the personal data and banking information of financial services customers at risk.

8 Steps to Zero Trust

Use this step-by-step guide from Akamai’s CTO, Charlie Gero, to build an inclusive and concrete zero trust architecture, intended to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time and reducing your migration risk profile.

5 Must-Ask DNS Questions

Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.

Load More