
The Akamai Blog Subscribe
Credential Stuffing and Account Takeovers -- The Bus ...
Account takeovers (ATOs), in which criminals impersonate legitimate account owners in order to take control of an account, cause tremendous pain for businesses in all industries. This pain may be monetary, such as losses from stolen accounts, but may also include a number of related problems, like regulatory and legal issues, lost customers, and the inability to gain new consumers due to a lack of trust. Losses from ATOs and
Don't reward your loyal customers by treating them l ...
I am CIAM not IAM Imagine shopping in your favourite wine merchant or checking in to the brand of hotel that you afford the most loyalty, and at the point of self-identification (either to prove age or verification) security is called over and you are frisked. Not a great experience. Would you patronise the establishment again?
What's the point of habitual cookie consent? Analyti ...
Last week I read an online post about schoolchildren who are taught in their IT lessons to just accept cookie consent pop-ups when they see them on the screen! That really is the definition of habitual consent. If we think about the intent of consent, it should be informed, unambiguous, and meaningful to the end user. In the example of the schoolchildren who were taught to consent by default: What
Going Beyond Advertising: Revenue Diversification in ...
The pandemic has had a profound short-term effect on publishers around the world -- a jump in readership somewhat dampened by disappearing advertising revenue. In many media firms, the digital channel has become most important, accelerating the move to digital while also highlighting the fragility of the display advertising market.
Safeguard Identity Data at the Source
Leverage Identity Cloud's built-in tooling to safeguard your customers' data from unnecessary exposure When your customers create an account on your website or application, they are entrusting their valuable information with you in order to establish a relationship. To maintain that relationship, they need to have faith that you will protect their information.
4 Tips for a Great CIAM RFP
Requests for proposals (RFPs) are a good way to start the product evaluation process as well as help clarify the project's scope and requirements. RFPs give you the ability to compare products and platforms more objectively and get you the best results for your project. That said, the process of documenting and clarifying your project requirements can be pretty painful and time-consuming.
Cyberattacks Evolve as the Hospitality and Travel In ...
While the world fights against the COVID-19 pandemic, cybercriminals are out in full force with a multitude of scams designed to take advantage of the confusion and panic. COVID-19 has -- by necessity -- made us all more comfortable working, playing, and buying online.
What's Next in Security
Whenever we talk about what's next for Akamai's security portfolio, we clearly want to look at the challenges that are top of mind for our customers -- both today and tomorrow. And what a year 2020 has shaped up to be in terms of new challenges for CISOs and their security teams.
What's New in Security, Part 2
Welcome to the Akamai Platform Update! We're presenting an entire week of learning about Akamai's recent product updates. Each day, we'll highlight our latest innovations in each area of the Akamai Intelligent Platform.