Get In Touch
First off, no -- the Internet is not going to break! That said, the news media is awash with stories and statistics about how the Internet is faring with the increase in traffic due to isolation protocols forcing daily functions online. Which functions? In my house, we have remote work, e-learning, online retail, online banking, streaming video, online gaming, video chat, social media, and Wi-Fi calling. I know I'm not
For decades, those of us who work on the infrastructure of the web have heard and talked a lot about "inflection points" -- points at which we have seen notable increases in Internet usage driven by commerce, entertainment, financial services, travel, etc. And now, without warning, the world changed. Every industry has been disrupted in a matter of weeks, and the world is likely never to be quite the same
In September 2019, NIST (National Institute of Standards and Technology) published the first draft of its Zero Trust Architecture (ZTA) for public feedback. A second draft was issued in February 2020 that incorporated industry feedback from the first cycle and solicited more comments. The document is extremely well written, and I would highly recommend all security and business continuity practitioners read it here.
The COVID-19 crisis has forced enterprises everywhere to find new ways of maintaining valued relationships with customers and partners. At Akamai, we are here to support you at every step during these uncertain times. With this in mind, we are hosting Edge Live, a virtual summit for industry leaders, technologists, developers, business executives, and thought leaders.
With each iteration, Akamai moves nearer to our goal of enabling elite performance by the development teams that depend on Akamai for delivering reliable and highly performant experiences to their customers. The March 2020 release empowers teams to develop at the Akamai edge with even greater velocity, security, and visibility.
Akamai Edge conference is here and I'm really excited to share some of my insights and thoughts about credential abuse attacks in my session "Akamai Threat Research into Credentials Abuse". Credential abuse attacks become a common disturbing threat in recent years, a successful credential abuse attack campaign can result with a potential damage that include losing access and control over the accounts, data breach and even fraudulent transactions.
One of the sessions at the upcoming Akamai Edge Conference 2016 will be 'Exploring User Expectations for Business Critical SaaS Applications'. This session will be hosted by Robert Mahowald; Group Vice President at IDC who leads IDC's worldwide application and cloud services practices. Robert will share findings key insights from the recent Akamai sponsored IDC 2016 SaaS User Requirements survey. We caught up with Robert recently to learn more about
These API's are critical to us...without them, we're hurting. - Terry Drozdowski, Director of Engineering, Exceda. At Akamai, we believe the future of the Internet lies in the hands of the developers and architects who tackle hard problems every day. With our Open Platform Initiative, we simplified access to the Akamai Intelligent Platform for better and easier integration with home-grown and third party technologies and applications. The initiative exposes the
Earlier you had to choose, should you personalize or cache everything... we wanted to do both. -- Fredrik Ahlen (CTO) The business decision had been made. Fredrik Ahlen (CTO) and Patrik Wallin (Lead Developer) of Health & Sports Nutrition Group (Gymgrossisten) were going to undergo a personalization overhaul to increase conversion rates. This meant personalizing nearly everything -- category pages, product pages, product recommendations and more. It was up to