Akamai Diversity

The Akamai Blog

Chinedu Egonu

Chinedu Egonu

January 30, 2019 11:16 AM

Protect Your Network From Malware

There are two types of companies: Those who have been hacked, and those who don't yet know they have been hacked1 With data breaches frequently making the news and causing panic among network administrators, the above statement by former Cisco boss John Chambers in 2015 certainly doesn't seem far-fetched. I don't remember a week in 2018 going by where I wasn't learning of a data breach and how sophisticated the

Amanda Fakhreddine

Amanda Fakhreddine

January 30, 2019 9:00 AM

State of the Internet, Volume 5, Issue 1

Is it too late to still say "Happy New Year?" We don't think so. We're kicking off 2019 with our first issue of the State of the Internet / Security.

Faraz Siddiqui

Faraz Siddiqui

January 29, 2019 2:21 PM

Software Defined Perimeter - a Modern VPN with Tradi ...

Application Servers are implemented as a means of providing services and making resources available to users. However, any server connected to the Internet is inevitably targeted by malicious users using open listening ports. There are millions of these ports on the Internet, which means there is plenty of opportunity to exploit these open services.

Akamai InfoSec

Akamai InfoSec

January 28, 2019 8:49 AM

A Look Back At The DDoS Trends of 2018

As mentioned in the 2018 Year in Review State of the Internet / Security report, trends in DDoS are remarkably stable. The size of the largest attacks have grown by approximately 6% on an annual basis, with occasional outliers like the Mirai botnet. The median size of attacks has been much more changeable, with a cyclic growth and retreat on a two year basis. Unluckily, the ebb of DDoS is

Gregory Griffiths

Gregory Griffiths

January 24, 2019 5:36 PM

The Five Layers of Identity

Identities are complicated. Getting to know someone well takes time and effort. When you first meet someone new, you ask a lot of questions to understand who they are and how you should relate to them. Social context also provides many cues for us as individuals. As relationships deepen, the nuance of individual personalities becomes revealed to us as we probe deeper, and also create shared experiences with others.

Sven Dummer

Sven Dummer

January 24, 2019 5:13 PM

Security Methods to Prevent Identity Breaches

Protecting against online crime and fraud in an interconnected, cross-device world is more challenging than ever for companies transacting valuable assets with other companies over the Internet, selling products or information in a web application, or under regulatory compliance mandates.

Eric Schreiner

Eric Schreiner

January 24, 2019 3:46 PM

Why User Experience (UX) is the centerpiece of digit ...

Digital transformation is a challenging and complex endeavor, and it's easy to get tripped up by unforeseen issues. For many organizations, the focal point of their digital transformation strategies is throwing their weight behind new mobile initiatives. These can often include both internal and customer-facing platforms, designed for a variety of purposes. A mobile platform is only as good as the user experience (UX) it provides, and businesses that fail

Gregory Griffiths

Gregory Griffiths

January 24, 2019 12:12 PM

Key considerations in selecting a CIAM solution

The rise of the digital-native consumer creates tremendous opportunities for organizations to develop deeper relationships with their customers in support of their business objectives. Whether the goals are to acquire new leads, increase on-site engagement, collect and leverage customer insights or all of the above, a comprehensive customer identity and access management (CIAM) solution will play a critical role.

Russell Loarridge

Russell Loarridge

January 24, 2019 9:43 AM

What is Customer Identity and Access Management (CIA ...

Truly knowing the customer is key to marketing success today. And it's not just about knowing their name, but understanding their true identity. The technology that makes this possible is known as customer identity and access management (CIAM).