The Akamai Blog
EdgeKV: Serverless Storage at the Edge
4 years 6 months ago
We are pleased to announce the launch of EdgeKV, our distributed key-value store, into beta! EdgeKV is enabling technology for EdgeWorkers, our serverless computing platform that enables developers to create services using JavaScript and deploy them across our platform. When writing JavaScript, data persistence is often necessary to save data from a user interaction, or to retrieve contextual data to evaluate inside a function.
Jeffrey Costa
Sensor Architecture Can Help Keep Us Up and Running: Part 2
4 years 6 months ago
Previously, I introduced the field of sensor systems architecture and posed a real world example scenario of the unnecessary resource costs and hazards that can happen when the deployment of sensors isn't carefully thought out.
Kristin Nelson-Patel
Finding the Best Servers to Answer Queries — Edge DNS and Anycast
4 years 6 months ago
While Unicast defines a single destination endpoint for a given IP, Anycast is an addressing technique in which the same IP is advertised from multiple servers simultaneously.
Sam Preston
Is MFA a Security Illusion?
4 years 6 months ago
A recent Akamai Security blog post, Massive Campaign Targeting UK Banks Bypassing 2FA, written by my colleague Or Katz, is a great insight into how attackers used very simple techniques to bypass two-factor (2FA) authentication security to obtain access to U.K. consumers' bank accounts.
Jim Black
Akamai Startup Program: Fostering Innovation
4 years 6 months ago
Akamai, the intelligent edge platform for securing and delivering digital experiences, continues to focus on innovation by launching Cohort 2 of the Akamai Startup program.
Arjun Rampal
Sensor Architecture Can Help Keep Us Up and Running: Part 1
4 years 6 months ago
In the constant press of rolling out ever better products and services to our customers, it can be easy-- and often necessary-- to fall into a reactive mode around reliability.
Kristin Nelson-Patel
Akamai Identified as a Leader in DDoS Mitigation by Forrester
4 years 6 months ago
This week, Akamai was again recognized as a Leader in the latest The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021.
Susan McReynolds
Compromised enterprise devices detection based on abnormal behavior patterns-- UEBA in action
4 years 6 months ago
Recently, many reports of incidents have been making headlines, proving that no business or industry is immune to advanced threat actors. Applying user and entity behavior analytics (UEBA) for the challenging task of the detection of compromised devices over time can play a critical role in enterprises' defense mechanisms.
Hen Tzaban
Better, or More Effective?
4 years 6 months ago
A colleague asked me to share my thoughts on building a "better team". I confess, I stumbled on the word "better". Better than what exactly?
Fadi Saba
Optimizing For Performance, One Hire at a Time: Part 3
4 years 6 months ago
Having previously decided we need to make a new hire onto our team, part 1 of this series examined how to meet the needs of our team going into the future, instead of just adding surface visible technical skills.
Kathryn Kun
Akamai's New ESG Office: A Catalyst for Environmental and Social Progress
4 years 6 months ago
We're proud of the progress Akamai has made in environmental, social, and governance (ESG) performance.
Aaron Ahola
What’s new in Guardicore Centra R26
4 years 7 months ago
New improvements to Guardicore Centra make it the fastest and simplest solution to protect against ransomware and meet the needs of zero trust.
Guardicore Labs Team
Bitcoins, Blockchains, and Botnets
4 years 7 months ago
A recent piece of malware from a known crypto mining botnet campaign has started leveraging Bitcoin blockchain transactions in order to hide its backup C2 IP address. It's a simple, yet effective, way to defeat takedown attempts.
Evyatar Saias
Out of My Depth (Where I Belong)
4 years 7 months ago
I remember well my first day as a member of Akamai's InfoSec department.
The Friday prior, I'd just completed the Akamai Technical Academy, a five-month crash-course in all things tech, and was now, on a cold but sunny Monday morning, joining InfoSec for their weekly staff meeting. Eager to make a good first impression, I took a seat at the large, crowded conference table, opened my notebook, and started to take notes.
Guest Blogger
Massive Campaign Targeting UK Banks Bypassing 2FA
4 years 7 months ago
On 14 July, 2020, Oliver Hough, a security researcher from Cyjax, published a report centered on a phishing campaign targeting banking customers in the United Kingdom, which evades two-factor authentication (2FA).
Or Katz
Can Edge Computing Exist Without the Edge? Part 3: The Economics of Edge Computing
4 years 7 months ago
Do the math. For the past decade, digital businesses have been investing in digital transformation initiatives. The promise is to increase top-line growth while maximizing customer lifetime value. As infrastructure improves, IT spending is shifting from the cloud to the edge. But while edge computing makes headlines, can you expect a meaningful return?
Ari Weil
Our Role in Inclusion, Diversity, and Engagement
4 years 7 months ago
The work of creating the most inclusive and diverse organization is never-ending. While that may seem daunting to some, I see it as exhilarating. Sure, I say that from the perspective of VP! But at Akamai, Inclusion, Diversity, & Engagement (ID&E) is a set of habits that belong to us all, and it's a commitment we should proudly share.
Khalil Smith
SolarWinds Hack and the Case of DNS Security
4 years 7 months ago
It's not news that some of the top government agencies and companies in the world were victims of the SolarWinds attack. At this point, I can say it's the reason I didn't have a smoother transition back into work-life following a long vacation. As I understand it, the breaches happened after malicious code was inserted into a software patch that was downloaded by the companies and agencies. The installation of the patch executed malicious code, called SUNBURST, which created an entry point for other malicious codes (TEARDROP/RAINDROP). These additional codes were used to allow attackers to move laterally within the network and exfiltrate sensitive customer information to a public command and control server.
Chinedu Egonu
NHS Vaccine Scams: Criminals Still Targeting COVID-19 Anxiety
4 years 7 months ago
It's 2021, but the anxiety, fear, uncertainty, and stress caused by the COVID-19 pandemic in 2020 is very much alive today.
Steve Ragan
Checked
4 hours 6 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed