Get In Touch
Akamai's 2nd annual Girls Who Code Summer Immersion program is now underway! Last Monday, we welcomed 20 high school girls to our Cambridge headquarters to begin their intensive seven week program. The girls will learn coding fundamentals, participate in field trips, workshops, and receive mentoring from Akamai employees.
On this date in 1998 - 17 years ago - Danny Lewin and I incorporated Akamai. That day marked the official start of Akamai as a business, and our team of about a dozen people (mostly MIT undergrads) moved out of my office at MIT and into a small rented space in Cambridge. None of us had any prior experience in business. We believed in our technology, we believed in
Hi. I'm Bhuvana Husain, Director of Programs & Operations in Akamai's Web Experience Business Unit. I'm also the Program Coordinator for this year's Girls Who Code Summer Immersion Program here at Akamai. As described in the previous blog posts by Kate Jenkins (Girls Who Code Summer Immersion Program at Akamai and Week 1 update on Akamai's Girls Who Code), we are thrilled to be hosting a group of 20 high school girls
Earlier today (Aug 6, 2015) at the Black Hat Security Conference in Las Vegas, Bishop Fox, a security research and penetration testing firm, announced the discovery of a vulnerability that allows an outside actor to conduct a cross-site request forgery (CSRF)/Server-Side Request Forgery (SSRF) attack using a combination of exploits. This vulnerability relied on the Akamai platform in two ways: specially-crafted legacy resource locators (also called v1 ARLs) in combination
Akamai is aware of a talk scheduled for Black Hat USA 2015 this week that will discuss some potential issues with platforms like ours. Mike Brooks and Matthew Bryant, security analysts at Bishop Fox, will give the following talk on Aug. 6: BYPASS SURGERY ABUSING CONTENT DELIVERY NETWORKS WITH SERVER-SIDE-REQUEST FORGERY (SSRF) FLASH AND DNS
Akamai is aware of a recently disclosed critical vulnerability in BIND (CVE-2015-5477) that can be exploited to cause a denial of service. How does the attack work? An attacker can cause BIND to exit by using a constructed packet to trigger a REQUIRE assertion via defective handling of a TKEY query. How is Akamai affected? Akamai's Fast DNS / EDNS authoritative name servers do not run BIND and as
Akamai is proud to have recently improved its position in the "Challengers" quadrant of Gartner, Inc.'s Magic Quadrant for Web Application Firewalls*. Gartner states: "By year-end 2020, more than 60% of public Web applications protected by a Web application firewall (WAF) will use WAFs delivered as a cloud service or Internet-hosted virtual appliance -- up from less than 15% today."
DD4BC, the malicious group responsible for several Bitcoin extortion campaigns last year, continues to expand attacks against Akamai customers. Researchers from Akamai's PLXsert and CSIRT teams continue to investigate attack activity related to the group. In recent weeks, the frequency of customers receiving ransom emails from this band of chaotic actors has steadily grown. DD4BC continues to inform victims that they will launch a DDoS attack of 400-500 Gbps
Wow! Last night the Akamai Adaptive Media Delivery Service was crowned Best Cloud or CDN Service Delivery solution at the TV Connect Awards 2015. I was thrilled to be there at the awards ceremony on behalf of Akamai and accept the award.