Meet Tedd Smith, solutions engineer at Akamai. He discusses today?s media-streaming landscape and how he crafts solutions for higher-quality user experiences.
Cybercriminals are attacking organizations in the APAC region with ransomware. Learn how to implement security strategies to mitigate and recover from attacks.
Learn about the benefits and drawbacks of a key-value store: a data structure designed for storing and returning values associated with keys as unique identifiers.
A love of technology and coding brought Josh Johnson to Akamai. Learn what he thinks a developer-first approach means for the Akamai developer community.
The IETF just released HTTP/3, an update to HTTP that leverages new transport protocol QUIC. Learn about how the new RFCs can affect any references to HTTP.
Atlassian has released a security advisory to address a remote code execution vulnerability (CVE-2022-26134) that?s affecting Confluence Server and Data Center products.
Low throughput DNS exfiltration is a slow and low attack technique that is very hard to detect. Learn how Akamai can quickly detect this in near real time.
Learn about our commitment to environmental sustainability, Akamai Earth Month, and other campaigns that inspire employees to take action to protect the planet.
Courtney Hadden
Checked
1 hour 22 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.