Akamai Diversity

The Akamai Blog

Lorenz Jakober

Lorenz Jakober

October 4, 2016 9:25 AM

Akamai acquires enterprise secure access innovator S ...

Providing employees with secure access to enterprise applications deployed behind the firewall is a core requirement for all businesses. Increasingly, businesses must also deal with delivering third-party access to critical applications whether hosted in the public cloud or a private data center.

Kate Jenkins

Kate Jenkins

July 6, 2016 12:15 PM

Girls Who Code is Back! 2016 Summer Immersion Progra ...

Akamai's 2nd annual Girls Who Code Summer Immersion program is now underway! Last Monday, we welcomed 20 high school girls to our Cambridge headquarters to begin their intensive seven week program. The girls will learn coding fundamentals, participate in field trips, workshops, and receive mentoring from Akamai employees.

Akamai

Akamai

August 20, 2015 10:08 AM

Happy 17th Anniversary Akamai!

On this date in 1998 - 17 years ago - Danny Lewin and I incorporated Akamai.  That day marked the official start of Akamai as a business, and our team of about a dozen people (mostly MIT undergrads) moved out of my office at MIT and into a small rented space in Cambridge.  None of us had any prior experience in business.  We believed in our technology, we believed in

Akamai

Akamai

August 11, 2015 9:22 AM

Planning for Final Projects with Girls Who Code

Hi. I'm Bhuvana Husain, Director of Programs & Operations in Akamai's Web Experience Business Unit. I'm also the Program Coordinator for this year's Girls Who Code Summer Immersion Program here at Akamai. As described in the previous blog posts by Kate Jenkins (Girls Who Code Summer Immersion Program at Akamai and Week 1 update on Akamai's Girls Who Code), we are thrilled to be hosting a group of 20 high school girls

Akamai

Akamai

August 6, 2015 12:51 PM

Details on the Cross-Site Request Forgery Vulnerabil ...

Earlier today (Aug 6, 2015) at the Black Hat Security Conference in Las Vegas, Bishop Fox, a security research and penetration testing firm, announced the discovery of a vulnerability that allows an outside actor to conduct a cross-site request forgery (CSRF)/Server-Side Request Forgery (SSRF) attack using a combination of exploits. This vulnerability relied on the Akamai platform in two ways: specially-crafted legacy resource locators (also called v1 ARLs) in combination

Akamai

Akamai

August 4, 2015 5:46 AM

Talk on CDN vulnerability at Black Hat USA 2015

Akamai is aware of a talk scheduled for Black Hat USA 2015 this week that will discuss some potential issues with platforms like ours. Mike Brooks and Matthew Bryant, security analysts at Bishop Fox, will give the following talk on Aug. 6: BYPASS SURGERY ABUSING CONTENT DELIVERY NETWORKS WITH SERVER-SIDE-REQUEST FORGERY (SSRF) FLASH AND DNS

Benjamin Brown

Benjamin Brown

July 31, 2015 9:03 AM

BIND DoS Vulnerability (CVE-2015-5477)

Akamai is aware of a recently disclosed critical vulnerability in BIND (CVE-2015-5477) that can be exploited to cause a denial of service. How does the attack work? An attacker can cause BIND to exit by using a constructed packet to trigger a REQUIRE assertion via defective handling of a TKEY query. How is Akamai affected? Akamai's Fast DNS / EDNS authoritative name servers do not run BIND and as

Akamai

Akamai

July 22, 2015 6:00 AM

Challenging the WAF Status Quo

Akamai is proud to have recently improved its position in the "Challengers" quadrant of Gartner, Inc.'s Magic Quadrant for Web Application Firewalls*. Gartner states: "By year-end 2020, more than 60% of public Web applications protected by a Web application firewall (WAF) will use WAFs delivered as a cloud service or Internet-hosted virtual appliance -- up from less than 15% today."

Akamai

Akamai

July 16, 2015 6:00 AM

DD4BC: Operation Update and FAQ

DD4BC, the malicious group responsible for several Bitcoin extortion campaigns last year, continues to expand attacks against Akamai customers. Researchers from Akamai's PLXsert and CSIRT teams continue to investigate attack activity related to the group. In recent weeks, the frequency of customers receiving ransom emails from this band of chaotic actors has steadily grown. DD4BC continues to inform victims that they will launch a DDoS attack of 400-500 Gbps