Akamai Diversity

The Akamai Blog

Mike Kane

Mike Kane

January 24, 2020 2:00 PM

Protecting Websites from Magecart and Other In-Brows ...

The Rise of Third-Party Scripts Modern web applications have become increasingly reliant on external code, services and vendors that execute JavaScript code in the browser... often referred to as third-party scripts. As a close-to-home example shown below, Akamai executes dozens of scripts to populate our home page. Nearly 70% of these scripts come from outside sources.

Tara Bartley

Tara Bartley

January 23, 2020 4:00 PM

Online Holiday Shopping followed the Hot Topics of 2 ...

Here's what I learned this past holiday season: I'm not alone shopping on my mobile device on Christmas Day and Boxing Day. And while Hollywood actors may take the holidays off, threat actors certainly do not. Let's have a look at some of the numbers. Akamai has a lot of data, but let's look at some of the most interesting tidbits.

Or Katz

Or Katz

January 23, 2020 12:30 PM

Zero Trust Access: Santa Claus Wasn't the Only One W ...

The days from Christmas Eve to New Year's Day are filled with celebrations. Many companies shut down and encourage their employees to take vacations. However, a sample of data comparing an average work week around the holiday, shows the idea of "downtime" isn't exactly accurate. In fact, many users are accessing corporate applications even on holidays such as Christmas and New Year's Day, particularly in the United States.

Keith Folz

Keith Folz

January 17, 2020 3:00 PM

Cookies, Single Sign-On, and You

What's the problem? As part of a concerted effort to protect end user privacy and increase browser security, major web browsers have been making changes to their treatment of 3rd party cookies. These changes are designed to cripple ad targeting services that track user behavior online and rely on 3rd party cookies.

CJ Arnesen

CJ Arnesen

January 17, 2020 3:00 PM

Maintain Your Streaming Posture During Failures With ...

Maintaining a high-quality playback experience for users is extremely critical whether it is for on-demand content or for large-scale live events. Origin failures occur when a server is overwhelmed with requests, due to congested networks or other unexpected events. These failures can keep origin responses from getting back to the client; hence, the need for redundant server architectures.

Sam Preston

Sam Preston

January 6, 2020 12:30 PM

Geolocation and DNS Traffic Management

What is GTM Global Traffic Management, or GTM, is a DNS-based load balancing service that offers application owners a level of flexibility and insight that is unmatched by traditional on-prem solutions. Highly scalable and fault-resilient, GTM offers customers a layer of abstraction between endpoints, so traffic can be easily shifted between targets. The platform is not limited to weighted load distribution, however; GTM can execute intelligent routing decisions based on

Jim Black

Jim Black

December 23, 2019 10:50 AM

Inspecting TLS Web Traffic - Part 3

In the second part of this blog, I covered how HTTPS web content inspection is provided in Akamai's Enterprise Threat Protector (ETP) service using ETP proxy. In this final blog post I want to provide information about how Akamai generates, distributes and controls access to private keys including TLS certificates.

Jim Black

Jim Black

December 19, 2019 3:30 PM

Inspecting TLS Web Traffic - Part 2

In the first blog post I covered why HTTPS web traffic has grown to unprecedented levels, provided a TLS primer and looked at the basic concept of intercepting and inspecting HTTPS web traffic with Man-In-The-Middle techniques (MITM). In the second part, I will dive a bit deeper into how the TLS MITM capability has been implemented in Akamai's Enterprise Threat Protector (ETP) service.

Alex Balford

Alex Balford

December 19, 2019 8:55 AM

Akamai Improves Global Delivery Performance

As part of Akamai's ongoing investments in improving delivery performance, last month we completed the worldwide deployment of the Bottleneck Bandwidth and RTT (BBR) TCP congestion control algorithm across our Edge Platform. The BBR algorithm is designed to help improve the reliability and resiliency of data by optimizing the rate at which it's transmitted over last-mile networks to end users. After more than a year of extensive testing, we've rolled