Akamai Diversity

The Akamai Blog

Christine Ross

Christine Ross

October 13, 2020 5:00 PM

Akamai's Polymorphic AI Framework Preemptively Manag ...

Too many security efforts react to threats as they come. While security teams often succeed through Herculean efforts, being constantly under siege takes its toll on your resources. The relentless barrage of bot attacks will eventually crack the human- and system-based methods to block or mitigate them.

Julio Chaves

Julio Chaves

October 13, 2020 5:00 PM

What's New in Services and Support

Why Services and Support? Whether you are new to Akamai or increasing your adoption of our solutions, Services and Support is here to help you take on the most challenging problems businesses face today, so you can offer consistent, fast, secure experiences to your customers.

CJ Arnesen

CJ Arnesen

October 12, 2020 5:00 PM

Three Cloud-First Akamai Initiatives to Support Your ...

61% of organizations plan to focus on cloud migration this year. 93% have a multi-cloud strategy.1 This means that on average your organization is using 2.2 public clouds, multiplying your complexity and your costs.

Jonathan Singer

Jonathan Singer

October 7, 2020 8:00 AM

Death by a Thousand Cuts: Nuisance DDoS Attacks in t ...

At Akamai, we talk a lot about DDoS attacks. It's because we're pretty good at handling them. We've stopped many of the world's biggest attacks. And, while less common, they get a lot of attention. But we can also stop the world's smallest attacks. And we stop lots of them. It's these smaller attacks that we're talking about today.

Beth Barach

Beth Barach

September 24, 2020 9:00 AM

Akamai Identified as a Leader Among Zero Trust Provi ...

We are pleased to share that Akamai has been identified as a Leader in The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020.

Or Katz

Or Katz

September 17, 2020 8:00 AM

Rethinking Defensive Strategy at the Edge, Part 3: S ...

Our three-part blog series, Re-thinking Defensive Strategy at the Edge, has been focusing on outlining a new defensive edge strategy for today's enterprise. We began with a discussion of data and indicators. Most recently, our second post focused on using risk signals and correlating them for improved security controls. This last post in the series will transition the discussion from data and correlation into how to use these to enable

Or Katz

Or Katz

September 16, 2020 8:00 AM

Rethinking Defensive Strategy at the Edge, Part 2: R ...

In the first post in our blog series Rethinking Defensive Strategy at the Edge, we began to outline why a new defensive edge strategy is needed for today's enterprise. As previously mentioned, the strategy enhances those in place and introduces another layer of defense that includes the following three components: data and indicators, risk-based signals and entities, and protective actions. This post explores user entities as well as risk-based signals

Or Katz

Or Katz

September 14, 2020 8:00 AM

Rethinking Defensive Strategy at the Edge, Part 1: A ...

In recent years, new enterprise remote access architectures and frameworks have been introduced, such as Zero Trust Access (ZTA). Those concepts have driven changes in the way the network perimeter has been defined -- specifically, from the outside in, not the inside out. Access to applications and services usually start from users and devices outside of traditional on-premises network perimeters.

Ari Weil

Ari Weil

September 11, 2020 3:04 PM

Unprecedented Levels of Ransom DDoS Extortion Attack ...

The FBI has released a flash warning that thousands of organizations around the world, and across multiple industries, have been threatened with DDoS attacks unless they pay a bitcoin ransom. This ransom DDoS, or RDoS, threat was covered by Akamai's Security Intelligence Response Team (SIRT) in a Security Alert released on August 17, 2020.