Akamai Diversity

The Akamai Blog

Volker Tegtmeyer

Volker Tegtmeyer

March 4, 2019 6:00 AM

Automated API Protection with WAP

For those who use Web Application Protector from Akamai: "Your APIs just got an extra layer of protection". For everyone else, learn how easy a WAF can be. You protect your web applications, that's awesome, but what about all your APIs? Do you know how many you have, who accesses them and what information they expose?

Jim Gilbert

Jim Gilbert

March 4, 2019 6:00 AM

Architecting DNS for DDoS Durability and Resilience

My business depends on my domain name being 100% available. How do I ensure my domain name is durable to attack and resilient during Internet stress? After many years of hard work from many Internet engineers and system administrators, Akamai Technologies has been working towards DNS infrastructure that would be ready for service 24/7, 365 days a year with beyond five 9s availability and the architecture to thwart any form

Renny Shen

Renny Shen

March 4, 2019 6:00 AM

Bot Manager: Staying Ahead of the Bot Landscape

Akamai launched Bot Manager three years ago. Since then, the bot landscape has continued to evolve and we've introduced a number of improvements to our bot detections to stay ahead of it. These included browser fingerprinting and behavioral anomaly detection, as well constantly refining our core bot detections such as request anomaly.

Renny Shen

Renny Shen

March 4, 2019 6:00 AM

What's New in Security - March 2019

Today, Akamai announced the March 2019 Release with new features and capabilities across its security, performance, and media product lines - with a focus on helping customers better manage their cloud migration initiatives. Within security, Akamai has made updates to every product line to help organizations better protect your apps and APIs, stop credential stuffing, and move to zero trust.

Lorenz Jakober

Lorenz Jakober

March 4, 2019 6:00 AM

Does Zero Trust Security Have to be Hard to be Effec ...

The short answer is no. As expected, the long answer is a little more nuanced. But first, a quick refresher on Zero Trust security for those who haven't jumped on the bandwagon yet. (For those who have, feel free to skip the next section.)

Asaf Nadler

Asaf Nadler

February 27, 2019 9:00 AM

Ramnit in the UK

By Asaf Nadler and Lior Lahav Ramnit is a family of trojans that allows attackers to remotely control infected machines, in order steal personal and banking information [1], and open backdoors to download additional malware [2]. Initial versions of Ramnit appeared in late 2011 and infected more than 800,000 Windows PCs [3]. In May 2018, Ramnit was observed in the "Black" botnet, and was responsible for infecting more than 100,000

Renny Shen

Renny Shen

February 14, 2019 12:00 PM

3 Reasons Your Business Needs Security at the Edge

As a security professional, no one knows better than you that the attack surface is shifting and continues to expand across an ever-widening area. Our interconnected digital lives are wreaking havoc with the idea of "the perimeter." As digital attacks continue to grow in size and volume, and are increasingly targeted, knowing what defense posture you need to deploy to stay safe is being redefined right before your eyes. That's

Akamai InfoSec

Akamai InfoSec

January 28, 2019 8:49 AM

A Look Back At The DDoS Trends of 2018

As mentioned in the 2018 Year in Review State of the Internet / Security report, trends in DDoS are remarkably stable. The size of the largest attacks have grown by approximately 6% on an annual basis, with occasional outliers like the Mirai botnet. The median size of attacks has been much more changeable, with a cyclic growth and retreat on a two year basis. Unluckily, the ebb of DDoS is

Andy Ellis

Andy Ellis

January 24, 2019 8:05 AM

Securing Social / Locking Login / Armoring Authentic ...

Authentication might be the single biggest hazard for web security over the next decade. It's not that the fundamentals of authentication are particularly challenging; we've understood the basic principles behind password management, push-based authorization, and device certificates for some time. But managing those at scale, and navigating to a more secure world -- maybe one without passwords someday -- requires a level of investment and focus that is, for most