The Akamai Blog
Why It?s Important to Make Tech More Accessible
1 year 10 months ago
Tashema Nichols-Jones
Identifying a DNS Exfiltration Attack That Wasn?t Real ? This Time
1 year 10 months ago
A recent red team DNS exfiltration alert confirms that Akamai Secure Internet Access is an effective security tool for this type of detection and analysis.
Moshe Cohen
ZEROgrid: A Dependable, Cost-Effective, Low-Emission Power System
1 year 10 months ago
Mike Mattera
Multiple Extortion: An Existential Threat
1 year 10 months ago
Explore effective strategies and comprehensive cybersecurity measures to protect your organization?s data from increasingly sophisticated cybercrimes.
Sven Dummer
Exploiting SteelSeries' Subapplication Mechanism for Privilege Escalation
1 year 10 months ago
Tomer Peled
Adopting Comprehensive API Security Falls Behind Need
1 year 10 months ago
Christine Ferrusi Ross
Akamai?s Perspective on July?s Patch Tuesday 2023
1 year 10 months ago
Akamai Security Intelligence Group
Aging-in-Place: Why HCIT Professionals Should Adopt Zero Trust Security
1 year 10 months ago
Carley Thornell
(Micro)Segmentation from a Practical Perspective
1 year 10 months ago
Stiv Kupchik
Charting a Course for the Modern Cloud
1 year 10 months ago
Adam Karon
Conquering Adversarial Bots and Humans to Prevent Account Takeovers
1 year 10 months ago
Ryan Gao & Brett Hickinbotham
Multicloud Strategies Must Evolve to Meet the Needs of Global IT Leaders
1 year 11 months ago
In a Forrester study commissioned by Akamai, global IT leaders explain why they are adopting cloud-native architecture and distributing apps and workloads.
Mike Maney
Why Open Enrollment Readiness Should Be a Year-Round Strategy
1 year 11 months ago
Today?s malicious actors see the healthcare industry as a target-rich environment, so getting ready for open enrollment should be a year-round process.
Carley Thornell
As Phishing Websites Flourish, Brands Seek Protection from Impersonation
1 year 11 months ago
Danielle Walter
3 Ways for Financial Institutions to Fight Account Takeover Fraud
1 year 11 months ago
Cheryl Chiodi
Proxyjacking: The Latest Cybercriminal Side Hustle
1 year 11 months ago
Allen West
The L in Linux Stands for Lateral Movement
1 year 11 months ago
Stiv Kupchik
Inclusion in Tech: Discover Diverse Career Paths for Women in Tech
1 year 11 months ago
Hema Patel discusses inclusive career paths, cancel culture in the workplace, and defying the traditional education limitations for women in tech.
Tashema Nichols-Jones
Navigating a New Reality: Content Personalization at Scale
1 year 11 months ago
Prioritizing content personalization can improve user engagement, enhance customer experiences, and boost revenue on a global scale.
Shane Keats
Checked
11 minutes 18 seconds ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed