Phishing Detection via Analytic Networks

As mentioned in previous Akamai blogs, phishing is an ecosystem of mostly framework developers and buyers who purchase kits to harvest credentials and other sensitive information. Like many framework developers, those focusing on phishing kits want to …

November 6, 2019
Read More >>

My First Job?Being Inspired and Having an Impact

Written by Bridget Meuse, Product Marketing Specialist – Corporate Sustainability I’ve recently hit my four-month mark here at Akamai and it’s been a whirlwind, to say the least. Despite having had two previous summer internships at Akamai, stepping in…

November 5, 2019
Read More >>

Volunteering with Girls Who Code

Volunteering with Girls Who Code has been one of the most enriching and edifying experiences of my time here at Akamai. I was chosen to serve as a mentor to one of the high school students, gave the NOCC tour…

October 25, 2019
Read More >>

Data in the dark: Data protection

Hyperconnectivity is on the rise and, as a result, corporations’ capacity to protect their own and their customers’ data becomes more and more limited. Connection takes place over a network, so, as connection increases, that network increases in size

October 11, 2019
Read More >>

Faster JWT Key Rotation in API Gateway

JSON Web Tokens (JWT) use digital signatures to establish the authenticity of the data they contain, as well as authenticating the identity of the signer. A valid signature check ensures that any party can rely on the contents and the…

October 11, 2019
Read More >>