The Akamai Blog
Experiment: Improving Page Load Times with Script Streaming
6 years 11 months ago
Utkarsh Goel
HTTP+TLS and IPV6-Enablement Both in the Majority for World Cup Streaming
6 years 11 months ago
The underlying protocols of the Internet continue to evolve, and massive events such as the World Cup are a great opportunity to see this in action.
Erik Nygren
We Are Akamai: What Led Us Here
7 years ago
About Akamai and the blog We are the people at the heart of the internet. Every day, we work together to protect our customers, deliver ultimate experiences in the digital world, and connect people from far corners of the planet....
Hema Patel
Six Years Since World IPv6 Launch: Entering the Majority Phases
7 years 1 month ago
While we still have a ways to go before residual users of IPv4 are truly "laggards", we are at a stage where the use of IPv6 should be considered the norm.
Erik Nygren
Operation Prowli: Monetizing 40,000 Victim Machines
7 years 1 month ago
Operation Prowli: Monetizing 40,000 Victim Machines
Daniel Goldberg, Ofri Ziv & Mor Matalon
Demystifying API Rate Limiting
7 years 1 month ago
APIs are the ?digital glue? that integrates and connects infrastructure, services, devices, and users. With the proliferation of APIs in almost every organization, it?s essential to have a mechanism in place to manage and govern them. That?s why we introduced Akamai API Gateway, which makes it easier for you to add governance to your APIs.
Shantanu Kedar
Introducing New WhoAmI Tool DNS Resolver Information
7 years 1 month ago
The Domain Name System (DNS) tools ?whoami.akamai.net? and its alias ?whoami.akamai.com? have been used for many years, often as a step in the process for diagnosing how a content delivery network (CDN) is directing traffic, locality, and network reachability issues. Whoami was originally introduced as a quick solution that, as often happens, ended up sticking around for far longer than expected.
Mario Korf
How-To: Add Timing-Allow-Origin Header to Improve Your Website Performance Measurements
7 years 2 months ago
Utkarsh Goel
Introducing Web Security Analytics
7 years 2 months ago
Every security team knows that the success of any security product relies heavily on the ability to maintain an optimal security configuration. Any misconfiguration can result in malicious or undesired traffic reaching the application, or worse - legitimate traffic being blocked. In addition, it can result in noisy false positive security events, which can eventually mask real attacks from being detected and blocked. What is Web Security Analytics? Akamai's new Web Security Analytics tool provides a single unified and efficient interface to assess a wide range of security events, perform analysis of events, and evaluate any needed changes in order to maintain an optimal security configuration. For example, customers can use this tool to better:
Ori Kanfer
The Dark Side of APIs: Part 1, API Overview
7 years 2 months ago
Application Programming Interfaces (API) are a software design approach which enables software and system developers to integrate with other systems based on a defined set of communication methods. APIs serve as software building blocks and allow for software reuse - essentially allowing fast development of new systems based on existing capabilities.
Ryan Barnett
Illuminating the Path to Digital Maturity
7 years 3 months ago
Research By Akamai and Forrester Sheds New Light on Digital Experience Challenges and Opportunities Nearly every business today is striving to create and deliver digital experiences that stand apart. But it's no small task turning those visions into reality. Moreover,...
Ari Weil
Recovering Plaintext Passwords from Azure Virtual Machines
7 years 3 months ago
Security design flaw in the VM Access plugin that may enable a cross platform attack impacting every machine type provided by Azure. Read More...
Daniel Goldberg
Experiments with Browser Preconnects
7 years 3 months ago
Utkarsh Goel
Your Cache is Exposed
7 years 4 months ago
On February 28, Akamai recorded a 1.35 Tbps DDoS attack against one of our customers. The attack was driven by a relatively new vector, memcached reflection. Possibly the largest publicly disclosed DDoS attack to date, the memcached attack was more than twice the size of the largest DDoS attacks that were launched against an Akamai customer by the operators of the Mirai botnet in September of 2016.
Chad Seaman
Beware of PerformanceTiming.domInteractive
7 years 7 months ago
Utkarsh Goel
How-To: Replaying Cellular Network Characteristics on Cloud Infrastructure
7 years 7 months ago
Utkarsh Goel
Introduction to DNS Data Exfiltration
7 years 9 months ago
Written by Asaf Nadler and Avi Aminov Updated 2/14/19 After the initial publication of this blog post, Asaf Nadler and Avi Aminov wrote a paper on the detection of malicious and low throughput data exfiltration over the DNS protocol. The...
Asaf Nadler
When Looking for SWIFT Audit Guidelines, Beware of the Customer Security Controls Framework
7 years 9 months ago
Ariel Zeitlin
The WireX Botnet: An Example of Cross-Organizational Cooperation
7 years 10 months ago
On August 17th, 2017, multiple Content Delivery Networks (CDNs) and content providers were subject to significant attacks from a botnet dubbed WireX. The botnet is named for an anagram for one of the delimiter strings in its command and control protocol. The WireX botnet comprises primarily Android devices running malicious applications and is designed to create DDoS traffic. The botnet is sometimes associated with ransom notes to targets.
Akamai InfoSec
Checked
5 hours 46 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed