The Akamai Blog
Women Can Make a Difference in the Field of Data Science
1 year 3 months ago
Tashema Nichols-Jones
Novel Detection of Process Injection Using Network Anomalies
1 year 3 months ago
Ofir Shen
Insights from Survey of Financial Services Cyber Leaders in Asia-Pacific
1 year 3 months ago
Cheryl Chiodi
Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 2
1 year 3 months ago
Ben Barnea
Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 1
1 year 3 months ago
Ben Barnea
The Shift to Distributed Cloud: The Next Era of Cloud Infrastructure
1 year 3 months ago
Mike Maney
Akamai?s Perspective on December?s Patch Tuesday 2023
1 year 3 months ago
Akamai Security Intelligence Group
How to Defend Against Digital Cyberthreats This Holiday Season
1 year 3 months ago
Reuben Koh
What We've Learned from Media Cloud Adoption Trends
1 year 3 months ago
Read the top takeaways from a global survey of leaders in the media and entertainment industry about their cloud adoption experiences and challenges.
Todd Loewenstein & Peter Chave
Observed Exploitation Attempts of Struts 2 S2-066 Vulnerability (CVE-2023-50164)
1 year 3 months ago
The Akamai Security Intelligence Group has seen numerous exploitation attempts on Apache Struts 2 since December 7, 2023, when a critical CVE was released.
Maxim Zavodchik, Sam Tinklenberg, Neeraj Pradeep & Noam Atias
Actively Exploited Vulnerability in QNAP VioStor NVR: Fixed, Patches Available
1 year 3 months ago
Chad Seaman & Larry Cashdollar
Our Top Takeaways from 2023 Gartner� Market Guide for Microsegmentation
1 year 3 months ago
Ravit Greitser
Improve Performance with HTTP/2 Stream Prioritization
1 year 3 months ago
Mihai Puchiu & Julio Chaves Herrera
Akamai EdgeWorkers for SaaS: Balancing Customization and Security
1 year 3 months ago
Aaron Alquist
Going Cloud Native, and What ?Portability? Really Means
1 year 3 months ago
Jay Jenkins
Spoofing DNS Records by Abusing DHCP DNS Dynamic Updates
1 year 3 months ago
Ori David
November?s Shopping Holidays: Online Shopping, Sales, and Magecart Attacks
1 year 3 months ago
Gal Meiri
Monolith Versus Microservices: Weigh the Pros and Cons of Both Configs
1 year 3 months ago
Pavel Despot
Actively Exploited Vulnerability in FXC Routers: Fixed, Patches Available
1 year 3 months ago
Kyle Lefton, Chad Seaman & Larry Cashdollar
Checked
4 hours 6 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed