Get In Touch
Last night I watched an On Demand episode of The American Experience titled Blackout, which recounted the 1977 power failure in New York City and its lasting impact on city due to widespread looting and destruction. With the power completely out, the operators at Con Ed got to work restoring power using a manual that was last updated after another massive blackout - in 1965.
Akamai is aware of a talk scheduled for Black Hat USA 2015 this week that will discuss some potential issues with platforms like ours. Mike Brooks and Matthew Bryant, security analysts at Bishop Fox, will give the following talk on Aug. 6: BYPASS SURGERY ABUSING CONTENT DELIVERY NETWORKS WITH SERVER-SIDE-REQUEST FORGERY (SSRF) FLASH AND DNS
A new hacking group has landed on the Akamai's PLXsert and CSIRT radar for taking responsibility for launching DDoS attacks against several of our customers in the financial services sector.The entity calls itself the "OurMine Team" and if it is to be believed, it has gained access to one customer's $500,000 account. The group has announced it will give that money to the poor.
This is an interesting time to be responsible for your organization's web presence. You've probably heard that marketing is becoming more accountable for business growth from websites, applications and all kinds of digital programs.
We've all been there. Traffic is bumper to bumper, and it looks like you're going to miss your meeting. But you've got access to cloud applications, so you search and find a coffeehouse two blocks ahead. You drop in, order the dark roast, punch in the password (javalover), and scour your email for the meeting link. You finally get your presentation open from a cloud storage app, fire up
Remember Saved by the Bell? You know, Zack Morris, A.C. Slater, Screech and the gang from the early 90's Saturday morning TV show? Mindlessly flipping through the late night channels, I landed on the episode in which Lisa Turtle (Lark Voorhies) was trying to impress a "scholarly gentleman" by posing deep questions about life: "What is art? Are we art? Is art, art?"
Cisco and Akamai Announce Solution to Enable Digital Experiences and Relieve Network Congestion Today marks another important milestone in Akamai's relationship with Cisco. Together we are enabling IT to respond to the business challenges to support the huge traffic increases brought on by the digital era. Specifically, the IT challenge of supporting business leaders who are innovating at the branch office. Consider a retailer engaging customers with mobile assisted
It was only six months ago that Akamai opened its core technology, revealing the Open Platform Initiative strategy. The main idea was to enable everyone; every developer, every customer and every partner, to access Akamai technology and benefit from its amazing power. You may arguably say that this was a small step on a long path. But let's look back and see how much we walked, using the evolution of
Hardware Security Modules (HSMs) are physical devices attached or embedded in another computer to handle various cryptographic functions. HSMs are supposed to provide both physical and logical protection of the cryptographic material stored on the HSM while handling cryptographic functions for the computer to which they are attached. As websites move to the cloud, are HSMs the right way to achieve our goals? Before we talk about goals, it is