Akamai Diversity

The Akamai Blog

Tara Bartley

Tara Bartley

August 5, 2019 9:44 AM

Three Keys to Infusing Security into your Corporate ...

Creating a security-oriented culture is a challenge for many businesses. There's a natural tension between development teams, that are under constant pressure to get new applications and features to market as quickly as possible, and security teams that need to protect critical systems and confidential data from hackers and cybercriminals. Aaron McKeown, Head of Security Engineering & Architecture at Xero, understands these challenges firsthand. Aaron has spent the past five

Renny Shen

Renny Shen

August 1, 2019 11:00 AM

4 Critical Elements Your Next Security Solution Must ...

Security is essential to the success of any digital business. But there's one thing you can always count on: security-related incursions are inevitable. And the results can be devastating. Security breaches erode trust and damage reputation.

Mani Sundaram

Mani Sundaram

May 28, 2019 11:00 AM

Protecting the New Online Frontiers: Akamai on Watch

At Akamai, security is at the heart of everything we create. After more than two decades on the front lines of the Internet revolution, Akamai continues to pioneer strategies, products, and solutions that keep the world's information safe and secure. We protect you from the data center, beyond the cloud, and to the Edge.

Tom Emmons

Tom Emmons

May 16, 2019 8:00 AM

Do DDoS attacks originate from Cloud Service Provide ...

In a word, yes. Cloud service providers (CSPs) continue to power a growing portion of the greater Internet. According to Cisco, by 2021, 73 percent of cloud workloads are going to be CSP based, which reflects a compound annual growth rate of 27.5 percent from 2016 to 2021.

Asaf Nadler

Asaf Nadler

May 13, 2019 7:13 AM

Exploring botnets in VR

By Asaf Nadler & Lior Lahav Botnets often use domain generation algorithms (DGAs) to select a domain name, which bots use to establish communication channels with their command and control servers (C2). Since Akamai analyzes over 2.2 trillion DNS requests per day, and detects thousands of active algorithmically generated domains (AGDs) per hour, our data science team decided to try to dive a little deeper

Volker Tegtmeyer

Volker Tegtmeyer

March 4, 2019 6:00 AM

Automated API Protection with WAP

For those who use Web Application Protector from Akamai: "Your APIs just got an extra layer of protection". For everyone else, learn how easy a WAF can be. You protect your web applications, that's awesome, but what about all your APIs? Do you know how many you have, who accesses them and what information they expose?

Jim Gilbert

Jim Gilbert

March 4, 2019 6:00 AM

Architecting DNS for DDoS Durability and Resilience

My business depends on my domain name being 100% available. How do I ensure my domain name is durable to attack and resilient during Internet stress? After many years of hard work from many Internet engineers and system administrators, Akamai Technologies has been working towards DNS infrastructure that would be ready for service 24/7, 365 days a year with beyond five 9s availability and the architecture to thwart any form

Renny Shen

Renny Shen

March 4, 2019 6:00 AM

Bot Manager: Staying Ahead of the Bot Landscape

Akamai launched Bot Manager three years ago. Since then, the bot landscape has continued to evolve and we've introduced a number of improvements to our bot detections to stay ahead of it. These included browser fingerprinting and behavioral anomaly detection, as well constantly refining our core bot detections such as request anomaly.

Renny Shen

Renny Shen

March 4, 2019 6:00 AM

What's New in Security - March 2019

Today, Akamai announced the March 2019 Release with new features and capabilities across its security, performance, and media product lines - with a focus on helping customers better manage their cloud migration initiatives. Within security, Akamai has made updates to every product line to help organizations better protect your apps and APIs, stop credential stuffing, and move to zero trust.