Akamai Diversity

The Akamai Blog

Bill Brenner

Bill Brenner

February 20, 2014 7:00 AM

RSA Preview: How Data Defeated Dogma

Our ongoing series of RSA Conference 2014 previews brings us to a topic we've told you about before: the battle to establish a bug bounty program at Microsoft.

Bill Brenner

Bill Brenner

February 19, 2014 5:28 AM

Prolexic Acquisition: More Research to Share

Now that Akamai's acquisition of Prolexic is official, I can answer a question I've gotten repeatedly: How will the addition of Prolexic impact the new Akamai Security site we're launching next week? It's an easy question to answer, but first some background:

Bill Brenner

Bill Brenner

February 19, 2014 5:16 AM

Video: The Evolving Threat Landscape

An overview of the evolving threat landscape with Akamai Director of Web Security Solutions Product Marketing, Dan Shugrue. Dan also shares how Akamai's Kona Site Defender service handles the increasing frequency, volume and sophistication of Web attacks.

Renny Shen

Renny Shen

February 18, 2014 10:35 AM

Kona + Prolexic = Akamai Web Security Solutions

Normal 0 false false false EN-US JA X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} It feels like it's been an eternity, but just 79 days ago, Akamai announced the acquisition of Prolexic. Now that the acquisition has officially closed, we can finally start talking more about what

Bill Brenner

Bill Brenner

February 18, 2014 5:59 AM

RSA Conference 2014: Previews from Around the Web

With a week to go before RSA Conference 2014, various tech publications are launching their annual what-to-expect articles. What follows are a few articles that offer some decent analysis.

Akamai

Akamai

February 14, 2014 9:29 AM

HQL Statement Tampering

Executive Summary "Hibernate is an object-relational mapping (ORM) library for the Java language, providing a framework for mapping an object-oriented domain model to a traditional relational database. Hibernate solves object-relational impedance mismatch problems by replacing direct persistence-related database accesses with high-level object handling functions." (Wikipedia) According to a recent Java developer survey, Hibernate was ranked as the 2nd most popular Java framework.

Bill Brenner

Bill Brenner

February 14, 2014 5:07 AM

InfoSec Mentors: #BSidesLV Needs You

One of the coolest things about Security B-Sides, in my opinion, is the effort that goes into giving industry newbies a hand up. The BSides Las Vegas Proving Ground Speaker Development Program is a powerful example of that. And the organizers need your help.

Dave Lewis

Dave Lewis

February 13, 2014 7:04 AM

NTP Reflection Attacks

Yesterday we saw the news outlets light up with breathless reports of a massive distributed denial of service that was directed at the boutique company, Cloudflare. There was much ado about the volume of the attack peaking at 400 Gbps according to the numbers released by them. But, was this little more than hyperbole? This would not be without precedent.

Dave Lewis

Dave Lewis

February 11, 2014 1:53 PM

Patch Tuesday Revision

Microsoft's patch Tuesday has arrived and further to our post from Feb 7th there have been a couple updates for the release this month. The revised bulletin contains two additional patches which address remote code execution issues in Internet Explorer and the Windows operating system.Find out how Akamai can help you with your patch management via origin offload.