Akamai Diversity

The Akamai Blog

Alex Grinman

Alex Grinman

December 15, 2020 9:00 AM

Smartphones are not the problem with MFA security

We've recently seen big attacks play out on prominent technology companies despite their use of smartphone-based multi-factor authentication. These attacks are real, they do happen, and it appears that even the smartphone cannot protect us anymore.

Dale Lenard

Dale Lenard

December 14, 2020 9:00 AM

The Importance of Feedback Loops with Akamai (Part 1 ...

The dictionary defines feedback as "The modification or control of a process or system by its results or effects, for example in a biochemical pathway or behavioral response."

Bruce Van Nice

Bruce Van Nice

December 10, 2020 9:00 AM

Smart DNS: Delivering the Best Subscriber Experience

This is the second in a series of blog posts that discuss how smart DNS resolvers can enhance ongoing network transformation efforts such as the transition to 5G, better integration of Wi-Fi, and new network designs that optimize the edge to improve the subscriber experience, service delivery, and network efficiency.

Tom Emmons

Tom Emmons

December 9, 2020 9:00 AM

Cyberweek 2020 Attracted Both Online Shoppers and DD ...

As we close out 2020, it should come as no surprise that Cyberweek (the week of Thanksgiving through Cyber Monday) proved big for DDoS attacks. Threat actors were out in force during this key shopping season, and they shifted their sights toward disrupting digital commerce-related industries.

Paul Jackson

Paul Jackson

December 9, 2020 9:00 AM

How DevOps Tools Can Help Publishers Thrive

Agility has proven to be a key weapon in the publisher arsenal during the pandemic. Agile firms -- particularly news publishers -- that switched directions or added digital services quickly reaped the rewards of new readers and viewers, even if the audience boost didn't result in a similar increase in revenues for ad-based services in the short term.

Tony Lauro

Tony Lauro

December 8, 2020 10:00 AM

The evolution of MFA authentication technology and w ...

Authentication attacks are big business, and no one is immune from them. In fact, two men were recently arrested and charged in the Twitter employee account compromise that happened in July 2020. Using employee account credentials, the attackers took over several highly visible celebrity Twitter accounts, which were then used for bitcoin scams. Think: "If you give me one bitcoin, I'll give you two!" Sounds legit, right?

Mayur Upadhyaya

Mayur Upadhyaya

December 8, 2020 9:30 AM

Don't reward your loyal customers by treating them l ...

I am CIAM not IAM Imagine shopping in your favourite wine merchant or checking in to the brand of hotel that you afford the most loyalty, and at the point of self-identification (either to prove age or verification) security is called over and you are frisked. Not a great experience. Would you patronise the establishment again?

Ari Weil

Ari Weil

December 8, 2020 9:00 AM

Can Edge Computing Exist Without the Edge? Part 2: E ...

In part 1 of this series, I drew the architectural distinction between a centralized cloud platform and a distributed edge network. This is an important foundation upon which to explain the difference between cloud computing and edge computing. The two serve very different and complementary purposes. However, in my experience, business leaders, product owners, and application developers often mistake them as competitive.

Jonathan Zarkower

Jonathan Zarkower

December 7, 2020 9:00 AM

Distinguishing Among DNS Services Part 2: The Econom ...

This is Part 2 of a 3-part blog series highlighting some of the distinguishing aspects of Akamai's DNS services, Edge DNS and Global Traffic Management. Part 1 focused on Akamai's DNS platform and what sets it apart. In Part 2, we take a closer look at the economics of DNS pricing models and why Akamai's approach is unique.