The Akamai Blog
Adding Multi-Factor Authentication to Employee Logins: A Sound Security Principle
3 years 7 months ago
The year 2021 was definitely challenging for security practitioners. The number of data breaches continued to rise; a report issued by the Identity Theft Resource Center stated that the total number of breaches in the first three quarters of 2021 exceeded the total number of events in all of 2020 by 17%.
Jim Black
Meet Mike Elissen: Founder of Our Akamai Developer Champions Program
3 years 7 months ago
Our longest-standing Developer Advocate, Mike Elissen, noticed an opportunity to make Akamai’s developer relations even stronger. He co-created Developer Champions, an advocacy program that helps Akamai employees better meet customer needs.
Chuck Freedman
Building the Future — Akamai’s Outlook on the Linode Acquisition
3 years 7 months ago
Akamai announced our intent to acquire Linode. The acquisition is intended to create the world’s most distributed compute platform. This new cloud to edge platform will make it easier for developers and businesses to build, run, and secure applications, especially given the complexities of Web3.
Adam Karon
1&1 Versatel Expands Its Business Portfolio in Germany with Akamai
3 years 7 months ago
1&1 Versatel is a B2B provider for fibre gigabit connections and network-related services in Germany. The company is part of the United Internet AG and as such a sister company of 1&1 AG. 1&1 Versatel operates one of the biggest and most powerful fibre networks in Germany - providing its own network in more than 250 German cities and has implemented over 50,000 business customer solutions. We’re delighted that such an innovative company has chosen to partner with Akamai to increase the reach of its customer base to include smaller enterprises and to make its operations secure.
Akamai
Akamai’s Compliance with Cross-border Transfer Laws
3 years 7 months ago
Akamai is compliant with applicable data privacy regulations in countries where we and our customers conduct business. This is a fundamental tenet of our company’s core values. After all, when you make life better for billions of people, billions of times a day, there’s an expectation that you will also protect their lives online. And that is exactly what we do.
James Casey
Log4j Bringing You Down? Try Infection Monkey’s New Log4Shell Attack Simulation
3 years 7 months ago
What if you could see how a real cyberattack might unfold in your network? Imagine the insights you would gain into your security posture if you could safely and easily simulate the behavior of malicious actors before they hit your defenses. That’s what the Infection Monkey does.
The Infection Monkey team
Exceptional Brand Experiences Go Far Beyond the 30-Second Super Bowl Ad
3 years 7 months ago
Super Bowl LVI is almost here, and with that comes one of my favorite pastimes: watching the commercials! And you know I’m not alone — 30% of viewers tune in to the big game primarily to see the commercials, upping the pressure on CMOs to “get it right.” But winning the hearts and minds of the more than 100 million anticipated viewers goes far beyond creating a captivating 30- or 60-second spot. In fact, the production, supporting digital assets, celebrity endorsements, talking animals, etc. just scratch the surface when it comes to delivering an exceptional brand experience.
Kim Salem-Jackson
Why You Shouldn't Tie IP Addresses to Tokens
3 years 7 months ago
Locking tokens to the client IP address might seem like a good way to prevent content theft, such as sharing of authenticated URLs that include tokens. It might even appear to work in small-scale test environments. However, the internet has evolved to a point where it’s quite common for clients to use multiple source IP addresses. This is especially true when a token is created by a server on one hostname (such as a CMS) but then validated by a server on another hostname, such as an Akamai edge server, when serving content.
Alex Balford & Erik Nygren
Welcome to Akamai TechDocs
3 years 7 months ago
We're pleased to announce the launch of Akamai’s brand-new documentation site: techdocs.akamai.com. Powered by ReadMe, our new site offers intuitive and interactive content designed to help you get the most out of your Akamai products.
Beth Favini
An Unprecedented Opportunity to Build Dynamic, Secure Broadband Access for All of the U.S.
3 years 7 months ago
All Americans, regardless of background or location, deserve a fast, safe, and reliable digital experience. Whether in Silicon Valley, rural Montana, or an underserved area in Chicago, entrepreneurs, businesses, and consumers should be on an equal footing online. Unfortunately, that is not the current reality, and the pandemic only amplified and exacerbated the existing digital divides we know so well.
Lauren Van Wazer & Robert Blumofe
FritzFrog: P2P Botnet Hops Back on the Scene
3 years 7 months ago
FritzFrog is a peer-to-peer botnet, which means its command and control server is not limited to a single, centralized machine, but rather can be done from every machine in its distributed network. In other words, every host running the malware process becomes part of the network, and is capable of sending, receiving, and executing the commands to control machines in the network.
Ben Barnea, Shiran Guez & Ophir Harpaz
A New Approach to Blocking Malicious JavaScript
3 years 7 months ago
Jim Black
What’s New for Developers: January 2022
3 years 8 months ago
Hello, and welcome to our very first Developer Community update of 2022. In this new monthly series, we’ll share highlights of what is happening across the Akamai Developer Community. Since this is the first blog we’re posting, we will also catch up on news from October 2021 through today.
Jessica Capuano Mora
Universal Plug and Play (UPnP): What You Need to Know
3 years 8 months ago
Universal Plug and Play (UPnP) is a widely used protocol with a decade-long history of flawed implementations across a wide range of consumer devices. In this paper, we will cover how these aws are still present on devices, how these vulnerabilities are actively being abused, and how a feature/vulnerability set that seems to be mostly forgotten could lead to continued problems in the future with DDoS, account takeover, and malware distribution.
Akamai SIRT
UPnProxy: Eternal Silence
3 years 8 months ago
UPnProxy is alive and well. There are 277,000 devices, out of a pool of 3.5 million, running vulnerable implementations of UPnP. Of those, Akamai can confirm that more than 45,000 have been compromised in a widely distributed UPnP NAT injection campaign.
Chad Seaman
Combat Piracy with Akamai Managed Content Protection
3 years 8 months ago
Learn how Akamai’s Managed Content Protection offering helps combat and mitigate the growing effects of online piracy for Akamai customers.
Harish Menon
Combat Piracy with Akamai Managed Content Protection
3 years 8 months ago
Learn how Akamai?s Managed Content Protection offering helps combat and mitigate the growing effects of online piracy for Akamai customers.
Harish Menon
Deploying Zero Trust Network Access for Secure Application Access? Don’t Forget to Secure Your Employees
3 years 8 months ago
Secure your workforce with the help of multi-factor authentication and Akamai's Zero Trust Network Access application in place of a virtual private network (VPN).
Jim Black
The Crypto Revolution Reaches Fever Pitch for Today’s Phishing Scammers
3 years 8 months ago
Akamai threat researchers tracked continuous cyberattack and crypto-phishing campaigns that took advantage of cryptocurrency-based scams.
Or Katz
Checked
13 hours 28 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed