Data center breaches can seem impossible to avoid, but good data center security can seriously reduce your risk. We look at famous breaches Equifax, Yahoo, & more.
Researchers at Akamai observed attackers using a novel approach for evading detection. This new technique - which we call Cipher Stunting - has become a growing threat, with its roots tracing back to early-2018. By using advanced methods, attackers are...
Containers vs virtual machines is an ongoing debate in many IT shops around the world. Learn what makes each unique, their common use cases, and how to keep both secure.
The introduction of AI into the workplace is creating uncertainty over the future of employment. However, research shows that tech will create "133 million" more jobs before 2022 than it will dissolve, as "new entities in the economy replace obsolete...
Similar to diverse workforces performing at a higher level, diverse network service deployments perform at a higher level that is increasingly important as the Internet continues to augment our reality. Akamai has 20 years of edge service deployment experience. Akamai's Intelligent Edge has proven that the "edge" requires more than "servers" on the edge. Fast, intelligent, and secure edge services require a mix of approaches, principles, and designs that start with DNS in mind.
At Akamai, we believe the future of tech is full of amazing opportunities. However, to ensure these opportunities are fulfilled, some things in the industry need to change. To enable these changes, we are committed to providing opportunities to anyone...
Jobs in the STEM and Tech fields are growing at "three times the pace of non-STEM jobs." The rise of technological advances means the tech industry is not slowing down anytime soon. In the next decade, there will be 1...
Introducing Cyber Threat Intelligence (CTI), a freely available resource to assist in identifying and investigating malicious IP addresses and domains.
The new purge by cache tag functionality in Akamai?s Fast Purge is now available to all Akamai content delivery product customers. To get to this point, we went through an exciting, year-long beta with more than 200 participants purging ~200,000,000 tags. During this time, we noted some fascinating (and surprising) ways that customers leveraged tags in their caching strategy -- we?ll share our six favorite here.
Like with any technology, Docker too has its security concerns. Learn the Docker security best practices that will help keep your infrastructure and applications secure.
Here at Akamai, we believe every person is important, and that no one should be left out. Our internal culture is cultivated by looking outwards, into the community, to make the life of our society better. Not only do we...
Have you ever wondered what it might be like to see inside one of the biggest tech companies in the world? Well, we're starting a new series of blogs to give you the insight you've never had before. Akamai's innovations...
Twenty years ago it would be common to have multiple data centers load balanced with specialized devices. The applications in multiple data centers would use the Domain Name System (DNS) to look up the application destination. The DNS system would be set up to with multiple data center locations. This would "round robin" the results between the data centers. If you have four data centers, the customers would get "round-robined" between each data center.
Everyone and everything on the Internet depends on the Domain Name System (DNS) being functional. The DNS has been a common vector for attacks in recent years, and 2019 seems to be no different. Many of these attacks have goals far more sinister than simply taking a company offline or defacing a website; reported attacks include redirecting some or all of an organization's domain to gain access to protected resources, intercept traffic, and even obtain TLS certificates for that domain. Organizations should perform regular DNS reviews and audits. The following guidelines provide a starting point for your review.
When it comes to phishing, criminals put a lot of effort into making their attacks look legitimate, while putting pressure on their victims to take action. In today's post, we're going to examine a recent phishing attempt against me personally....