Akamai Diversity

The Akamai Blog

Recently by Philip Tellis

Sven Dummer

Sven Dummer

January 24, 2020 2:00 PM

Embracing Data Privacy Day

January 28 is Data Privacy Day, commemorating the Council of Europe Treaty known as Convention 108, the first legally binding international treaty on data protection signed on January 28, 1981. This "holiday" was originally celebrated in Europe where it is known as Data Protection day. But in 2009, the United States and Canada joined in the celebration. In the U.S., Data Privacy Day is sponsored by the National Cyber Security

Mike Kane

Mike Kane

January 24, 2020 2:00 PM

Protecting Websites from Magecart and Other In-Brows ...

The Rise of Third-Party Scripts Modern web applications have become increasingly reliant on external code, services and vendors that execute JavaScript code in the browser... often referred to as third-party scripts. As a close-to-home example shown below, Akamai executes dozens of scripts to populate our home page. Nearly 70% of these scripts come from outside sources.

Tara Bartley

Tara Bartley

January 23, 2020 4:00 PM

Online Holiday Shopping followed the Hot Topics of 2 ...

Here's what I learned this past holiday season: I'm not alone shopping on my mobile device on Christmas Day and Boxing Day. And while Hollywood actors may take the holidays off, threat actors certainly do not. Let's have a look at some of the numbers. Akamai has a lot of data, but let's look at some of the most interesting tidbits.

Or Katz

Or Katz

January 23, 2020 12:30 PM

Zero Trust Access: Santa Claus Wasn't the Only One W ...

The days from Christmas Eve to New Year's Day are filled with celebrations. Many companies shut down and encourage their employees to take vacations. However, a sample of data comparing an average work week around the holiday, shows the idea of "downtime" isn't exactly accurate. In fact, many users are accessing corporate applications even on holidays such as Christmas and New Year's Day, particularly in the United States.

Keith Folz

Keith Folz

January 17, 2020 3:00 PM

Cookies, Single Sign-On, and You

What's the problem? As part of a concerted effort to protect end user privacy and increase browser security, major web browsers have been making changes to their treatment of 3rd party cookies. These changes are designed to cripple ad targeting services that track user behavior online and rely on 3rd party cookies.

CJ Arnesen

CJ Arnesen

January 17, 2020 3:00 PM

Maintain Your Streaming Posture During Failures With ...

Maintaining a high-quality playback experience for users is extremely critical whether it is for on-demand content or for large-scale live events. Origin failures occur when a server is overwhelmed with requests, due to congested networks or other unexpected events. These failures can keep origin responses from getting back to the client; hence, the need for redundant server architectures.

Sam Preston

Sam Preston

January 6, 2020 12:30 PM

Geolocation and DNS Traffic Management

What is GTM Global Traffic Management, or GTM, is a DNS-based load balancing service that offers application owners a level of flexibility and insight that is unmatched by traditional on-prem solutions. Highly scalable and fault-resilient, GTM offers customers a layer of abstraction between endpoints, so traffic can be easily shifted between targets. The platform is not limited to weighted load distribution, however; GTM can execute intelligent routing decisions based on

Jim Black

Jim Black

December 23, 2019 10:50 AM

Inspecting TLS Web Traffic - Part 3

In the second part of this blog, I covered how HTTPS web content inspection is provided in Akamai's Enterprise Threat Protector (ETP) service using ETP proxy. In this final blog post I want to provide information about how Akamai generates, distributes and controls access to private keys including TLS certificates.

Jim Black

Jim Black

December 19, 2019 3:30 PM

Inspecting TLS Web Traffic - Part 2

In the first blog post I covered why HTTPS web traffic has grown to unprecedented levels, provided a TLS primer and looked at the basic concept of intercepting and inspecting HTTPS web traffic with Man-In-The-Middle techniques (MITM). In the second part, I will dive a bit deeper into how the TLS MITM capability has been implemented in Akamai's Enterprise Threat Protector (ETP) service.