Akamai Diversity

The Akamai Blog

September 2020 Archives

Javier Garza

Javier Garza

September 30, 2020 8:00 AM

Akamai: Supporting Development at the Edge

The pressures on application and web development teams to deliver exceptional customer experiences have never been greater than they are at this time. With consumer expectations growing, the ability of developers to deliver fresh, leading-edge digital experiences confidently and at high velocity is at a premium.

Bruce Van Nice

Bruce Van Nice

September 28, 2020 10:45 AM

"School From Home" Changes Residential Internet Safe ...

2020 has been a year of epic change as we all work together to minimize the adverse impact of COVID-19. There's been extensive coverage in blogs and media as businesses navigated a rapid transition to remote work for their employees and pivoted to address an entirely new set of security considerations.

Peter Chave

Peter Chave

September 28, 2020 8:00 AM

CMAF... This is the Way

Optimize your streaming content catalog The debate is over. Common Media Application Format (CMAF) has delivered on its promise: one package to serve them all. Two of the highest profile direct-to-consumer (DTC) streaming service launches recently made the leap, validating that the time has come for CMAF.

Javier Garza

Javier Garza

September 25, 2020 8:00 AM

Fighting Smoke with Open Source

I'm a developer advocate at Akamai and a huge proponent for the open source initiative. So, today I am going to tell you a story of how a regular person like you or me can make an impact with just a little bit of goodwill, and a pinch of open source.

Beth Barach

Beth Barach

September 24, 2020 9:00 AM

Akamai Identified as a Leader Among Zero Trust Provi ...

We are pleased to share that Akamai has been identified as a Leader in The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020.

David Theobald

David Theobald

September 24, 2020 8:00 AM

Serverless at the Edge: Enabling Magical Unicorns

Before we dive straight into the magical unicorn from heaven that is serverless computing embedded within the CDN edge (a direct customer quote that I want on a team T-shirt soon), let's first level-set on some basic concepts of computing. In the context of web experiences, IoT device messaging, and really anything else that travels across the public internet, compute can happen in three venues:

Mani Sundaram

Mani Sundaram

September 23, 2020 11:15 AM

The Importance of Listening

Akamai has been a leader in customer service for years, and we've leveraged that experience to best support our customers through the COVID-19 pandemic. That includes our internal customers, our employees who are working hard to do their jobs while adjusting to a full-time remote environment. This is brand new for all of us, so it's more important than ever to listen to their needs.

Bruce Van Nice

Bruce Van Nice

September 22, 2020 11:04 AM

Smart DNS for the New Network Edge

This is the first in a series of blog posts that will discuss how smart DNS resolvers can enhance ongoing ISP and MNO network transformation efforts such as the transition to 5G, better integration of Wi-Fi, and new network designs that optimize the edge to improve service delivery and network efficiency.

Neha Jain

Neha Jain

September 17, 2020 11:30 PM

FFEM: A Simple Device to Crowdsource Water Quality D ...

Akamai has been a strong advocate for water conservation by supporting early-stage innovations. This World Water Monitoring Day (September 18), we present the inspiring work of one of our innovators -- Foundation For Environmental Monitoring (FFEM), based in Bangalore, India -- that is working on developing open source devices to monitor key environmental parameters such as water and soil.

Or Katz

Or Katz

September 17, 2020 8:00 AM

Rethinking Defensive Strategy at the Edge, Part 3: S ...

Our three-part blog series, Re-thinking Defensive Strategy at the Edge, has been focusing on outlining a new defensive edge strategy for today's enterprise. We began with a discussion of data and indicators. Most recently, our second post focused on using risk signals and correlating them for improved security controls. This last post in the series will transition the discussion from data and correlation into how to use these to enable

Siddharth Deshpande

Siddharth Deshpande

September 16, 2020 2:30 PM

Getting Sassy About SASE - the Value of Edge Securit ...

As a former Gartner analyst and now a strategist at Akamai, I have had several conversations with CISOs across the world on the topic of "designing a future-ready security architecture."

Or Katz

Or Katz

September 16, 2020 8:00 AM

Rethinking Defensive Strategy at the Edge, Part 2: R ...

In the first post in our blog series Rethinking Defensive Strategy at the Edge, we began to outline why a new defensive edge strategy is needed for today's enterprise. As previously mentioned, the strategy enhances those in place and introduces another layer of defense that includes the following three components: data and indicators, risk-based signals and entities, and protective actions. This post explores user entities as well as risk-based signals

Or Katz

Or Katz

September 14, 2020 8:00 AM

Rethinking Defensive Strategy at the Edge, Part 1: A ...

In recent years, new enterprise remote access architectures and frameworks have been introduced, such as Zero Trust Access (ZTA). Those concepts have driven changes in the way the network perimeter has been defined -- specifically, from the outside in, not the inside out. Access to applications and services usually start from users and devices outside of traditional on-premises network perimeters.

Ari Weil

Ari Weil

September 11, 2020 3:04 PM

Unprecedented Levels of Ransom DDoS Extortion Attack ...

The FBI has released a flash warning that thousands of organizations around the world, and across multiple industries, have been threatened with DDoS attacks unless they pay a bitcoin ransom. This ransom DDoS, or RDoS, threat was covered by Akamai's Security Intelligence Response Team (SIRT) in a Security Alert released on August 17, 2020.

Ziv Eli

Ziv Eli

September 11, 2020 12:15 PM

When Hackers Take Advantage of Your Trusted Vendors

As JavaScript-based client-side attacks continue to evolve, we see how attackers are getting more sophisticated and employing more advanced techniques. Unfortunately, it has been proven many times that any website partner can be exploited to carry out an attack. In the past month, we witnessed one of the most popular and trusted vendors being used as a credit card data exfiltration vector -- Google Analytics.

Renny Shen

Renny Shen

September 9, 2020 8:00 AM

Web Application and API Protection -- From SQL Injec ...

SQL injections were first discovered in 1998, and over 20 years later, they remain an unsolved challenge and an ongoing threat for every web application and API. The Open Web Application Security Project (OWASP) highlighted injection flaws in its Top 10 lists for both web application security risks and API security threats.

Ari Weil

Ari Weil

September 8, 2020 8:00 AM

Every Application Should Be Behind a WAF

It's no secret that security threats continue to expand in volume and variety, making headlines on virtually a daily basis. From nation-state attacks, corporate espionage, and data exfiltration campaigns to all-in-one and sneaker bot campaigns, businesses across the globe find themselves dealing with a deluge of inbound threats. The increased amount and variation of threats, and the proliferation of apps being deployed and managed by teams and individuals across the

Stephen Stierer

Stephen Stierer

September 3, 2020 2:35 PM

Metrics That Matter: Continuous Performance Optimiza ...

To attract and retain customers, you must offer an exceptional digital experience. In an increasingly competitive business climate, organizations are fighting to maintain loyalty and keep users engaged online. The cost of switching is low, consumers are transient, and user expectations for how digital experiences should perform have never been higher.

Ian Munford

Ian Munford

September 2, 2020 3:29 PM

Tackling Video Piracy Head-On

We are clearly in a "new" golden age of TV. Audiences around the world have never had so many viewing options available. This has led to a creative surge in new groundbreaking storytelling and entertainment as both broadcasters and digital giants try to maintain the loyalty of their viewers. This is a double-edged sword however, because as the production of great content increases, so do the opportunities for video pirates.

Jim Black

Jim Black

September 2, 2020 9:00 AM

Akamai, CISA, and CIS Join Forces to Improve SLTT Cy ...

Cybercriminals continue to target U.S. state, local, tribal, and territorial (SLTT) government organizations. In 2019, there were more than 100 ransomware attacks -- including an attack on Baltimore's IT systems that locked out thousands of computers and disrupted nearly every city service. This attack is estimated to have cost the city as much as $18 million.