Akamai Diversity

The Akamai Blog

Greg Burns

Greg Burns

December 29, 2020 9:00 AM

Akamai Prolexic and Equinix Cloud Exchange Unite, Br ...

In terms of cyberthreats and digital risk, 2020 has been all about DDoS attacks. We've seen threat actors launch record breaking 1.44 Tbps and 809 Mpps attacks, cybercriminals conduct the largest global DDoS extortion campaign, and a significant uptick in cyberweek DDoS attacker activity aimed at disrupting digital commerce. Now, more than ever, organizations see DDoS as an insurance policy to keep internet-facing applications and services available -- it is

Bruce Van Nice

Bruce Van Nice

December 28, 2020 9:00 AM

Smart DNS for the New Network Edge: Emerging Require ...

This blog post -- the fourth in a series -- will discuss how smart DNS resolvers can enhance ongoing ISP and MNO network transformation efforts, such as the transition to 5G, better integration of Wi-Fi, and new network designs that optimize the edge to improve service delivery and network efficiency.

Jonathan Singer

Jonathan Singer

December 23, 2020 9:00 AM

Launching a New Game Studio and Planning for Growth

So, you're starting your own game studio. This is an incredible opportunity! You and your team get to start fresh and build the game of your dreams! But, let's be honest, if you have just founded your own game studio, odds are that you're not a technical architect. You may have some technical know-how, but studio founders typically come from the creative side.

Pavel Despot

Pavel Despot

December 22, 2020 9:00 AM

How the Edge Improves Microservices

Microservice architecture has transformed the way we develop and operate our applications. Microservices aren't a technology or a programming language. Instead, they create a structure for designing and building applications based on the idea that the individual functions of a website should operate independently. From this simple concept comes a multitude of benefits including:

Jeffrey Costa

Jeffrey Costa

December 21, 2020 9:00 AM

What's the Value of a Key-Value Store?

A database back end for your application is vital, and odds are that your database is a relational database or a "not only SQL" (NoSQL) database. Relational databases have dominated the software industry for decades, even as other technologies have radically changed around it. A relational database management system (RDBMS) should be understood as though management system is in bold type, as you must actively manage the data contained within

Bruce Van Nice

Bruce Van Nice

December 17, 2020 9:00 AM

Smart DNS for the New Network: Optimizing Content De ...

This is the third in a series of blog posts that will discuss how smart DNS resolvers can enhance ongoing internet service provider (ISP) and mobile network operator (MNO) network transformation efforts, such as the transition to 5G, better integration of Wi-Fi, and new network designs that optimize the edge to improve service delivery and network efficiency.

Gerhard Giese

Gerhard Giese

December 16, 2020 9:00 AM

10 Ways to Protect Against DDoS Attacks

Distributed denial-of-service (DDoS) attacks continue to grow in size, frequency, and complexity, threatening businesses and service providers around the world. A warning was recently issued about a steep uptick of DDoS attack threats demanding bitcoin ransom with thousands of organizations across industries and around the world targeted. In June, AWS disclosed a record-setting 2.3 Tbps DDoS attack, breaking the previous record, a 1.3 Tbps attack mitigated by Akamai back in

Ryan Barnett

Ryan Barnett

December 15, 2020 9:00 AM

Stopping Active Attacks with Penalty Box

A web application firewall (WAF) is most often used by organizations for external security controls to detect and block individual attack attempts against target web application assets.

Alex Grinman

Alex Grinman

December 15, 2020 9:00 AM

Smartphones are not the problem with MFA security

We've recently seen big attacks play out on prominent technology companies despite their use of smartphone-based multi-factor authentication. These attacks are real, they do happen, and it appears that even the smartphone cannot protect us anymore.