The Akamai Blog
Why It?s Important to Make Tech More Accessible
1 year 8 months ago
Tashema Nichols-Jones
Identifying a DNS Exfiltration Attack That Wasn?t Real ? This Time
1 year 8 months ago
A recent red team DNS exfiltration alert confirms that Akamai Secure Internet Access is an effective security tool for this type of detection and analysis.
Moshe Cohen
ZEROgrid: A Dependable, Cost-Effective, Low-Emission Power System
1 year 8 months ago
Mike Mattera
Multiple Extortion: An Existential Threat
1 year 8 months ago
Explore effective strategies and comprehensive cybersecurity measures to protect your organization?s data from increasingly sophisticated cybercrimes.
Sven Dummer
Exploiting SteelSeries' Subapplication Mechanism for Privilege Escalation
1 year 8 months ago
Tomer Peled
Adopting Comprehensive API Security Falls Behind Need
1 year 8 months ago
Christine Ferrusi Ross
Akamai?s Perspective on July?s Patch Tuesday 2023
1 year 8 months ago
Akamai Security Intelligence Group
Aging-in-Place: Why HCIT Professionals Should Adopt Zero Trust Security
1 year 8 months ago
Carley Thornell
(Micro)Segmentation from a Practical Perspective
1 year 8 months ago
Stiv Kupchik
Charting a Course for the Modern Cloud
1 year 8 months ago
Adam Karon
Conquering Adversarial Bots and Humans to Prevent Account Takeovers
1 year 8 months ago
Ryan Gao & Brett Hickinbotham
Multicloud Strategies Must Evolve to Meet the Needs of Global IT Leaders
1 year 9 months ago
In a Forrester study commissioned by Akamai, global IT leaders explain why they are adopting cloud-native architecture and distributing apps and workloads.
Mike Maney
Why Open Enrollment Readiness Should Be a Year-Round Strategy
1 year 9 months ago
Today?s malicious actors see the healthcare industry as a target-rich environment, so getting ready for open enrollment should be a year-round process.
Carley Thornell
As Phishing Websites Flourish, Brands Seek Protection from Impersonation
1 year 9 months ago
Danielle Walter
3 Ways for Financial Institutions to Fight Account Takeover Fraud
1 year 9 months ago
Cheryl Chiodi
Proxyjacking: The Latest Cybercriminal Side Hustle
1 year 9 months ago
Allen West
The L in Linux Stands for Lateral Movement
1 year 9 months ago
Stiv Kupchik
Inclusion in Tech: Discover Diverse Career Paths for Women in Tech
1 year 9 months ago
Hema Patel discusses inclusive career paths, cancel culture in the workplace, and defying the traditional education limitations for women in tech.
Tashema Nichols-Jones
Navigating a New Reality: Content Personalization at Scale
1 year 9 months ago
Prioritizing content personalization can improve user engagement, enhance customer experiences, and boost revenue on a global scale.
Shane Keats
Checked
2 hours 28 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed