Next-Generation Technologies & Secure Development , Threat Hunting , Threat Intelligence

Proactive Mitigation: A Cybersecurity Imperative

Akamai's Jay Coley on Blunting Hackers by Blocking Emerging Types of Attacks
Jay Coley, security director, Akamai Technologies

A top cybersecurity imperative for organizations is to "take proactive mitigation before an event even occurs," says Akamai's Jay Coley.

See Also: OnDemand | Reactive to Proactive: Elevating OT Cybersecurity with Threat Intelligence

Akamai carries a significant portion of the world's business traffic. "We collect a lot of data, we see a lot of data, especially with regards to security and attack trends … on the internet today," Coley says. The company then feeds that intelligence back to customers so that they can act to block emerging attack types and or take action based on attack trends.

"Attackers really have to see a return on investment when they're operating," he says. "So the more frequent attacks we see are the ones still having a good return on investment for their efforts. When the attacks become less effective, they start to drop off."

In a video interview at the recent Infosecurity Europe conference, Coley discusses:

  • Emerging attack trends;
  • The need for more automated responses;
  • With attack types always evolving, how defensive capabilities must evolve.

Coley is security director at Akamai Technologies.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing devicesecurity.io, you agree to our use of cookies.