The IETF just released HTTP/3, an update to HTTP that leverages new transport protocol QUIC. Learn about how the new RFCs can affect any references to HTTP.
Atlassian has released a security advisory to address a remote code execution vulnerability (CVE-2022-26134) that?s affecting Confluence Server and Data Center products.
Low throughput DNS exfiltration is a slow and low attack technique that is very hard to detect. Learn how Akamai can quickly detect this in near real time.
Learn about our commitment to environmental sustainability, Akamai Earth Month, and other campaigns that inspire employees to take action to protect the planet.
Meet Mike Schiessl to learn more about his career path, how companies can support a DevOps to DevSecOps transition, and the future of security and business.
Preparing for open enrollment is a key part of running efficient healthcare organizations, but it's difficult to know where to start. Learn which steps to take.
JavaScript is everywhere, and when malicious can be hugely detrimental. In this blog, learn about the types of malicious JavaScript and how Akamai's SWG product helps keep you more secure from it.
The joint security solution from Akamai Guardicore Segmentation and Armis supports PCI compliance requirements to protect consumer data across entire networks.
Explore three ways healthcare organizations can boost cybersecurity, critical infrastructure, and ransomware protection to prepare for potential cyberthreats.
Phishing is not a new security problem. In fact, it?s been around since the earliest days of email when most users received numerous emails from African kings or other high-ranking officials who promised them great riches if they simply provided their bank account details. Things have changed a lot since then.
WAF Attacks have been increasing dramatically over the last 9 months. These attacks cut across industries, geos and customers. Growth has largely been driven by Local File Inclusion (lfi) attacks, which took the lead from SQL Injection attacks in early 2021 before just taking off in the fall.
Talking about secure networks is like talking about safe pools. A pool is just a body of water, and if it has enough water to swim in, then it has more than enough water to drown in. A pool is inherently unsafe. We, therefore, take care in how we use a pool: We don?t swim alone; we don?t run around the pool; we don?t dive in the shallow end; and we don?t swim less than 15 minutes after eating. (Is that 15-minute rule still a thing?) These pool-safety policies ensure that our use of the pool is as safe as possible, but they do not make the pool safe in and of itself.
Today, technology is infused into nearly everything we do. The data behind personalized recommendations, connected devices, and wearables has changed how we engage with the world around us ? whether we?re driving to a new destination, purchasing from a new retailer, or monitoring our health.
It?s all too common that IT security tools and practices come at the cost of productivity. Even physical security has this trade-off. There would be no rush to arrive at the airport an hour early if it weren?t for the extensive security measures that flying entails. As a result of this trade-off, our concern often isn?t if we can increase security in our networks ? rather, it?s if the increased security is worth the impact on the business.
We have big news this month. You may have already heard that we acquired Linode, creating the world?s most distributed compute platform. In addition, we have release announcements and new developer content to share with you!
Jessica Capuano Mora
Checked
13 hours 12 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.