Akamai Diversity

The Akamai Blog

Andy Ellis

Andy Ellis

January 24, 2019 8:05 AM

Securing Social / Locking Login / Armoring Authentic ...

Authentication might be the single biggest hazard for web security over the next decade. It's not that the fundamentals of authentication are particularly challenging; we've understood the basic principles behind password management, push-based authorization, and device certificates for some time. But managing those at scale, and navigating to a more secure world -- maybe one without passwords someday -- requires a level of investment and focus that is, for most

Ari Weil

Ari Weil

January 7, 2019 11:30 AM

From the Core to the Edge: 3 Security Imperatives an ...

The breathtaking pace at which everyone and everything is becoming connected is having a profound effect on digital business, from delivering exceptional experiences, to ensuring the security of your customers, applications, and workforce.

Chris Wraight

Chris Wraight

January 4, 2019 2:07 PM

Christmas Day was Quiet for Online Retailers But Pic ...

Christmas Holiday Retail Sales In early November, eMarketer forecast that the 2018 U.S. online retail holiday sales would be $106 billion, a healthy increase of 16.6% over 2017.

Chinedu Egonu

Chinedu Egonu

December 31, 2018 10:43 AM

Zero Trust and the Case for Application Microsegment ...

Data breaches have become incessant. Recently, a very popular airline sevices company revealed a suspected breach involving customer credit card information. Even more recently, a hospital in Indiana reported that a virus had infected some of its systems that caused the hospital to be placed on diversion. A disaster recovery software company also admitted that a breach of its marketing databases occurred. If that isn't enough, an online electronics retailer

Maria Ramirez

Maria Ramirez

December 19, 2018 2:36 PM

Zero Trust Security Protects Businesses while Enabli ...

Many companies have their own applications, internal domains, and local area network (LAN). But when it comes to business applications, organizations are increasingly dependent on cloud-based resources. These may include email servers, customer relationship management (CRM) software, or other applications. However, when access to internal machines by external users is necessary, the most common solutions are centered on virtual private networks (VPNs).

Volker Tegtmeyer

Volker Tegtmeyer

December 17, 2018 8:00 PM

Akamai Received Top Scores in Gartner's New Report " ...

Are you in the process of selecting a web application firewall (WAF) or thinking about whether your current solution is adequate? For many organizations selecting the right WAF to protect their business is not an easy task. The threat landscape is changing fast and hackers are very creative in their own ways. The good news is that Gartner just released a new report "Critical Capabilities for Cloud Web Application Firewalls

Akamai InfoSec

Akamai InfoSec

December 10, 2018 8:11 AM

Defending Credentials From Automated Attack Tools

By Danny Wasserman The folks on the Akamai Professional Services team are the people who help implement, configure, and tune the cloud security products that protect our customers' web applications from the daily onslaught of bots blasting login attempts against their websites, mobile apps, and APIs. We decided to take a look at some popular tools used by threat actors to launch these credential abuse attacks and what can be

Haru Kaneko

Haru Kaneko

November 29, 2018 9:26 AM

ZERO TRUST SECURITY - THREAT REPORT FOR EDUCATION

Originally Published: https://blogs.akamai.com/jp/2018/09/post-9.html Generation Z and New Challenges in the Education Field The youth of Generation Z grew up with Windows 2000 and XP, and many played with iPhones, iPads, and Android products. Known as digital natives, they are an essential part of today's educational landscape -- where cloud, mobile, and social networks form the infrastructure for their daily lives. For them, the Internet itself may seem more relevant than

Erik Nygren

Erik Nygren

October 16, 2018 9:23 AM

Architectural paths for evolving the DNS

The Domain Name System (DNS) is one of the Internet's fundamental systems, providing the top-level hierarchy for naming Internet resources. One of its purposes is to act as a sort of phonebook, allowing names such as "www.example.com" to be resolved to resource information, such as server IP addresses. It provides the hierarchical naming model that enables clients to "resolve" or "lookup" resource records associated with names. This naming hierarchy also