This post discusses how Guardicore Labs helps Guardicore customers and the security community enhance their security posture.
Introducing Ability Purge Cache Tag
The new purge by cache tag functionality in Akamai?s Fast Purge is now available to all Akamai content delivery product customers. To get to this point, we went through an exciting, year-long beta with more than 200 participants purging ~200,000,000 ta…
KNOW AND PICK YOUR ANDROID SECURITY APP WISELY
IN BRIEF: In recent year, we have seen a tremendous increase of
mobile applications across many countries – It is like everyone want to come
with a mobile application for many reasons. On the other hand, the rate of fake
and malicious mobile app…
5 Docker Security Best Practices to Avoid Breaches
Like with any technology, Docker too has its security concerns. Learn the Docker security best practices that will help keep your infrastructure and applications secure.
Akamai in the Community: Making Tech Accessible
Here at Akamai, we believe every person is important, and that no one should be left out. Our internal culture is cultivated by looking outwards, into the community, to make the life of our society better. Not only do we…
NATO weighing Huawei spying risks to member countries
The alliance takes seriously the potential espionage risk posed by the Chinese telecom giant, says NATO Secretary General Jens Stoltenberg.
The Voice of Tech: Who We Are, What We Want to Say
Have you ever wondered what it might be like to see inside one of the biggest tech companies in the world? Well, we’re starting a new series of blogs to give you the insight you’ve never had before. Akamai’s innovations…
A Simple Trillion$ Cyber Security Question for the Entire RSA Conference
Folks,
This week, the famous RSA Conference 2019 is underway, where supposedly “The World Talks Security” –
If that’s the case, let’s talk – I’d like to respectfully ask the entire RSA Conference just 1 simple cyber security question –
…
Avoiding Security Misconfiguration
Security Misconfiguration exposes networks to risk on premises and the cloud. What do you need to know to limit firewall security misconfiguration?
Global Traffic Management for Cloud, Data Centers, and CDNs
Twenty years ago it would be common to have multiple data centers load balanced with specialized devices. The applications in multiple data centers would use the Domain Name System (DNS) to look up the application destination. The DNS system would be s…