Akamai Diversity

The Akamai Blog

Ziv Eli

Ziv Eli

September 11, 2020 12:15 PM

When Hackers Take Advantage of Your Trusted Vendors

As JavaScript-based client-side attacks continue to evolve, we see how attackers are getting more sophisticated and employing more advanced techniques. Unfortunately, it has been proven many times that any website partner can be exploited to carry out an attack. In the past month, we witnessed one of the most popular and trusted vendors being used as a credit card data exfiltration vector -- Google Analytics.

Renny Shen

Renny Shen

September 9, 2020 8:00 AM

Web Application and API Protection -- From SQL Injec ...

SQL injections were first discovered in 1998, and over 20 years later, they remain an unsolved challenge and an ongoing threat for every web application and API. The Open Web Application Security Project (OWASP) highlighted injection flaws in its Top 10 lists for both web application security risks and API security threats.

Ari Weil

Ari Weil

September 8, 2020 8:00 AM

Every Application Should Be Behind a WAF

It's no secret that security threats continue to expand in volume and variety, making headlines on virtually a daily basis. From nation-state attacks, corporate espionage, and data exfiltration campaigns to all-in-one and sneaker bot campaigns, businesses across the globe find themselves dealing with a deluge of inbound threats. The increased amount and variation of threats, and the proliferation of apps being deployed and managed by teams and individuals across the

Stephen Stierer

Stephen Stierer

September 3, 2020 2:35 PM

Metrics That Matter: Continuous Performance Optimiza ...

To attract and retain customers, you must offer an exceptional digital experience. In an increasingly competitive business climate, organizations are fighting to maintain loyalty and keep users engaged online. The cost of switching is low, consumers are transient, and user expectations for how digital experiences should perform have never been higher.

Ian Munford

Ian Munford

September 2, 2020 3:29 PM

Tackling Video Piracy Head-On

We are clearly in a "new" golden age of TV. Audiences around the world have never had so many viewing options available. This has led to a creative surge in new groundbreaking storytelling and entertainment as both broadcasters and digital giants try to maintain the loyalty of their viewers. This is a double-edged sword however, because as the production of great content increases, so do the opportunities for video pirates.

Jim Black

Jim Black

September 2, 2020 9:00 AM

Akamai, CISA, and CIS Join Forces to Improve SLTT Cy ...

Cybercriminals continue to target U.S. state, local, tribal, and territorial (SLTT) government organizations. In 2019, there were more than 100 ransomware attacks -- including an attack on Baltimore's IT systems that locked out thousands of computers and disrupted nearly every city service. This attack is estimated to have cost the city as much as $18 million.

Mark Carrizosa

Mark Carrizosa

August 25, 2020 9:45 AM

Enterprise Application Access Client (EAA) Vulnerabi ...

On October 15, 2019, Tesla discovered, and responsibly disclosed, a vulnerability within Akamai's Enterprise Application Access (EAA) client that allows privilege escalation and remote code execution (RCE) when an attacker is within privileged locations on a network.

Ashitha Bhanu

Ashitha Bhanu

August 20, 2020 8:22 AM

The Changing Face of Loyalty Programs Amid and Post- ...

COVID-19 has undoubtedly prompted the Hospitality and Travel industry into a new era of customer loyalty. Currently, "shelter in place" or similar nonessential travel bans are instituted by many countries and companies across the world. Once travel restrictions are lifted, there will be a transition period where travel will be limited or less available until the virus is fully contained. Thus, the disruption to both leisure and business travel is

Jonathan Singer

Jonathan Singer

August 19, 2020 4:34 PM

How Criminals Attack the Games Industry

If you work in the video games industry, it's already obvious that security is a challenge, and criminals are a threat. But how much do you know about how the criminal economy works? What actually motivates them? What specific methods do they use? And how do they interact with one another?