So many things wrong here. An “emergency communications channel” protected by a widely shared username and password? Unauthorized use perhaps, but not hacking. And if you do have shared credentials, not rotating them after a high profile firing is insane. #zerotrust #authenticateallthethings

A reminder that cloud service providers hold a lot of control over your systems and data. Contracts and SLAs can’t protect you. If they pull the plug you’re the one picking up the pieces. Choose carefully.

IT teams: if you’re struggling to support a flood of WFH - don’t compromise on security or performance. Akamai’s EAA adds CDN performance and protection to your enterprise applications and scales well. This is how we are eliminating our own VPN usage at Akamai. #zerotrust #novpn #killthepassword

sharing my insights on how to move an enterprise to a zerotrust access model. #mbfeb

This mirrors my thoughts exactly. Why would you trust a VPN provider (and their providers) more than your own provider? Outsourcing privacy seems like a pretty big failure point. Make sure all your traffic is encrypted, push for eSNI and ditch the 3rd parties?

This is a pretty good read on “why zerotrust?”… #zerotrust

Without any interaction with the “victim” is it easier to find their home address and phone number or their mother’s maiden name, starting only from their own name, and a rough geographic location (typical New England town)? My gut says the latter.

I’d love to nerd out talking about #zerotrust at Akamai Edge World this year. There’s even a video

They don’t normally let me out in public. This might be a one in a lifetime opportunity to hear this.…

Forecasting the top 4 RSA Conference themes for 2019 - GeekWire

They missed ZeroTrust. Not just my employer (stop by Akamai’s booth on Wednesday), but across the expo floor. SDP, identity aware proxies and micro segmentation will be common phrases across many of the vendors.

Check out the Akamai Security Operations Center in this clip: