Akamai Diversity

The Akamai Blog

Hitoshi Kaneko

Hitoshi Kaneko

May 12, 2021 9:00 AM

Visualize and Analyze Bots with Real User Monitoring

You interact with more than just customers on your website. Bots make up a disproportionate amount of traffic, which can skew human behavior analysis data -- and cause you to make the wrong business decisions. In fact, one Akamai customer with 30% of total traffic from bots noticed a huge gap in business metrics like bounce and conversion rates. Since human and bot behaviors are unique, you need to analyze

Tom Leighton

Tom Leighton

May 11, 2021 6:00 AM

Why Developers Are Writing Apps on Our Edge Platform

A lot of companies talk about edge computing today, but at Akamai, we've been doing it for more than 20 years. We were the first company to offer edge computing services, beginning in 1999 with advanced metadata, an XML-based language used to enable a variety of capabilities on our edge platform -- things like access revocation, ad insertion, throttling, and visitor prioritization. We followed this with our deployment of Edge

Ian Munford

Ian Munford

May 6, 2021 9:00 AM

Defeating the Pirates

In Akamai's paper, "Inside the World of Video Pirates," we discovered why digital intellectual property theft (aka "piracy") is possibly the most misunderstood form of cybercrime facing the TV, sports, and film industries. The paper explored how piracy strategically impacts the industry, how the various financially motivated criminals groups operate, and why many seemingly law-abiding people still continue to participate in what is often perceived as a victimless crime. Despite

Patrick Sullivan

Patrick Sullivan

April 30, 2021 1:00 PM

CISA Emergency Directive 21-03: VPN Vulnerabilities ...

On April 20, 2021, the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) released an alert on the exploitation of Pulse Connect Secure Vulnerabilities with Alert AA21-110A: Exploitation of Pulse Connect Secure Vulnerabilities, as well as Emergency Directive (ED) 21-03, after a FireEye blog shed light on security incidents involving compromises of Pulse Secure VPN appliances. The directive outlines the specific actions all US federal agencies should take

Mick Higgins

Mick Higgins

April 29, 2021 9:00 AM

Anyone For a Smart Network Slice?

As with any standardization effort, development of 5G specifications accounted for numerous technology trends and new use cases. Network functions were designed for virtualization and automation to enhance operational efficiency and agility. At the same time, smart devices were in the midst of a steep ascent, and there was clear business value in new applications that took advantage of the optimized service characteristics of 5G, with somewhat cryptic names like

Shiran Guez

Shiran Guez

April 28, 2021 9:00 AM

Observed Changes to the Threat Landscape in 2020

Reflecting on the cybersecurity threat landscape in 2020, we can't overlook the massive changes that landed on us. Global security attacks increased at a significant pace between 2019 and 2020, and the COVID-19 pandemic only deepened these troubling conditions. As corporations tried to adapt to remote working practices and other environmental changes, cybercriminals ramped up their attacks. By following the trends, we will try to show the clear line of

Mani Sundaram

Mani Sundaram

April 28, 2021 1:00 AM

Supporting Akamai Communities Impacted by COVID-19

While those of us in places like the U.S. are experiencing some relief with access to the COVID-19 vaccine, it has been heartbreaking to see surges in infection, hospitalization, and death across the globe, including the dire situation in India. Bengaluru is Akamai's largest office. And while the majority of our employees there have been working remotely for over a year, everyone has been affected by the devastation. I grew

Jim Black

Jim Black

April 26, 2021 9:00 AM

Don't Risk Getting Caught by Kr3pto Phishing Kits

Akamai's threat research team recently published a report showing that a new phishing toolkit named Kr3pto was targeting UK banking customers. A phishing kit is an all-in-one software package that lets just about anyone create and launch phishing attacks designed to steal user data by posing as a trusted entity. In the past, attackers needed to clone the target site, but now kits have evolved to include the decoy, making

Mike Mattera

Mike Mattera

April 22, 2021 9:00 AM

Announcing Akamai's 2030 Sustainability Goals

There are 4.66 billion (yes, with a B) internet users. Rough math will tell us that's three in every five people around the world -- talk about lessening the six degrees. I see head nods and shoulder shrugs. 4.66 billion people? Ehh, that number feels a bit low, especially given the pervasive role the internet has in our lives today. Let's contextualize that number for a moment. Our reliance on