Get In Touch
Written by Lisa Adams The Girls Who Code Summer Immersion program at Akamai Technologies is off to a great start! During Week 1 we welcomed the class of 20 girls and the teaching team of three instructors from Girls Who Code. The girls began learning how to program in the Scratch language, and already gave impressive demonstrations using their new skills! We also conducted the Meet and Greet event, which
Count me among the tech pundits who got last night wrong. I predicted to my colleagues that peak traffic on election night here in the U.S. wouldn't beat the debates. Boy was I wrong! We've been tracking peak traffic and peak concurrent viewers across a basket of 16 customers for the debates, election night and early next year, Inauguration Day.
Providing employees with secure access to enterprise applications deployed behind the firewall is a core requirement for all businesses. Increasingly, businesses must also deal with delivering third-party access to critical applications whether hosted in the public cloud or a private data center.
Akamai's 2nd annual Girls Who Code Summer Immersion program is now underway! Last Monday, we welcomed 20 high school girls to our Cambridge headquarters to begin their intensive seven week program. The girls will learn coding fundamentals, participate in field trips, workshops, and receive mentoring from Akamai employees.
On this date in 1998 - 17 years ago - Danny Lewin and I incorporated Akamai. That day marked the official start of Akamai as a business, and our team of about a dozen people (mostly MIT undergrads) moved out of my office at MIT and into a small rented space in Cambridge. None of us had any prior experience in business. We believed in our technology, we believed in
Hi. I'm Bhuvana Husain, Director of Programs & Operations in Akamai's Web Experience Business Unit. I'm also the Program Coordinator for this year's Girls Who Code Summer Immersion Program here at Akamai. As described in the previous blog posts by Kate Jenkins (Girls Who Code Summer Immersion Program at Akamai and Week 1 update on Akamai's Girls Who Code), we are thrilled to be hosting a group of 20 high school girls
Earlier today (Aug 6, 2015) at the Black Hat Security Conference in Las Vegas, Bishop Fox, a security research and penetration testing firm, announced the discovery of a vulnerability that allows an outside actor to conduct a cross-site request forgery (CSRF)/Server-Side Request Forgery (SSRF) attack using a combination of exploits. This vulnerability relied on the Akamai platform in two ways: specially-crafted legacy resource locators (also called v1 ARLs) in combination
Akamai is aware of a talk scheduled for Black Hat USA 2015 this week that will discuss some potential issues with platforms like ours. Mike Brooks and Matthew Bryant, security analysts at Bishop Fox, will give the following talk on Aug. 6: BYPASS SURGERY ABUSING CONTENT DELIVERY NETWORKS WITH SERVER-SIDE-REQUEST FORGERY (SSRF) FLASH AND DNS
Akamai is aware of a recently disclosed critical vulnerability in BIND (CVE-2015-5477) that can be exploited to cause a denial of service. How does the attack work? An attacker can cause BIND to exit by using a constructed packet to trigger a REQUIRE assertion via defective handling of a TKEY query. How is Akamai affected? Akamai's Fast DNS / EDNS authoritative name servers do not run BIND and as