Akamai Diversity

The Akamai Blog

Sven Dummer

Sven Dummer

January 24, 2020 2:00 PM

Embracing Data Privacy Day

January 28 is Data Privacy Day, commemorating the Council of Europe Treaty known as Convention 108, the first legally binding international treaty on data protection signed on January 28, 1981. This "holiday" was originally celebrated in Europe where it is known as Data Protection day. But in 2009, the United States and Canada joined in the celebration. In the U.S., Data Privacy Day is sponsored by the National Cyber Security

Keith Folz

Keith Folz

January 17, 2020 3:00 PM

Cookies, Single Sign-On, and You

What's the problem? As part of a concerted effort to protect end user privacy and increase browser security, major web browsers have been making changes to their treatment of 3rd party cookies. These changes are designed to cripple ad targeting services that track user behavior online and rely on 3rd party cookies.

Ashley Adelman

Ashley Adelman

October 9, 2019 11:00 AM

Akamai's 3 Takeaways from the Gartner CIAM Solution ...

We have eagerly awaited Gartner's analysis of the growing CIAM industry. According to Gartner, in its August 2019 Solution Comparison for Customer Identity and Access Management Capabilities of 9 Vendors, "CIAM offerings are expanding and are now key business enablers for unifying customer experience and streamlining operations."

Sven Dummer

Sven Dummer

September 5, 2019 9:40 AM

How Can Akamai Identity Cloud Help With Regulatory C ...

Regulatory compliance related to personal identifiable information (PII) is continuously being enacted around the world as the amount of breaches and data abuse continues to grow. Understanding the variances between the many different privacy and data protection laws can be challenging for companies -- from the EU's General Data Protection Regulation (GDPR), to California's upcoming Consumer Privacy Act (CCPA), Australia's Privacy Act, to Japan's Act on the Protection of Personal

Sven Dummer

Sven Dummer

June 24, 2019 11:00 AM

Sign in with Apple

What's in a Login Button? All you need to know about the new "Sign in with Apple" For Akamai Identity Cloud, we intend to support our clients that wish to implement "Sign in with Apple" just like we do for Facebook, Google, Instagram, Twitter, LinkedIn and about 30 other Identity Providers. If you use it for your apps and websites, here's what you need to know.

Ashley Adelman

Ashley Adelman

May 28, 2019 11:00 AM

3 Tips to Action Consumer Trust with Data Security a ...

High-profile data breaches and increasingly sophisticated security threats are driving smart brands to better manage the mass amounts of consumer data they've spent years collecting. To do so, brands must prioritize their customers' interests and build a modern data security and privacy strategy where consumer trust is central.

Jennifer Merredew

Jennifer Merredew

May 21, 2019 11:00 AM

Akamai Receives a Loyalty360 Top 10 Award

Customer experience is built into Akamai at the core. Our web performance and media delivery products have helped businesses provide seamless, secure digital experiences for years... whether it's making sure your experience is flawless during a flash sale online to ensuring you can access your bank account online to streaming your favorite show on the device of your choice.

Gregory Griffiths

Gregory Griffiths

January 24, 2019 5:36 PM

The Five Layers of Identity

Identities are complicated. Getting to know someone well takes time and effort. When you first meet someone new, you ask a lot of questions to understand who they are and how you should relate to them. Social context also provides many cues for us as individuals. As relationships deepen, the nuance of individual personalities becomes revealed to us as we probe deeper, and also create shared experiences with others.

Sven Dummer

Sven Dummer

January 24, 2019 5:13 PM

Security Methods to Prevent Identity Breaches

Protecting against online crime and fraud in an interconnected, cross-device world is more challenging than ever for companies transacting valuable assets with other companies over the Internet, selling products or information in a web application, or under regulatory compliance mandates.