As I began my CSR Co-op position this year, I wanted to see up-close how a corporate foundation works. What I’ve found is that the work the Akamai Foundation does around the world is inspiring! Whether it’s partnering with STEM educators, responding to…
Akamai’s Commitment to Reliability
For more than 20 years, Akamai has worked very hard to earn the trust and confidence of our customers and partners by developing services that can be relied upon to be available and secure at all times.
Zeek in Action Videos
This is a quick note to point blog readers to my Zeek in Action YouTube video series for the Zeek network security monitoring project. Each video addresses a topic that I think might be of interest to people trying to understand their network usin…
Zero Trust Should Not Give IT a Bad Name
Maybe you?ve just found out that your company?s IT organization is implementing Zero Trust. Does that mean they don?t trust you? ?Zero Trust? sure sounds that way. Maybe you?ve read about it online or heard somebody talk about it in terms that equate Z…
Holiday Readiness, Part One: What you Should be Thinking About Four Months Out?Security
The beginning of August is upon us, and if you haven?t already started thinking about the busiest time of the year, now is a good time to do so. Whether you?re an experienced veteran of managing peak traffic or new to the game, Q4 can bring surprises w…
Payment Security: Understanding the Four Corner Model
Introduction Online shopping digital payment transactions may seem quite simple, but in reality, just one single transaction sets off multiple, long-chain reactions. The Payment Card Industry comprises debit cards, credit cards, prepaid, e-purse/e-wall…
Software-Defined Networking Concept Adoption at Akamai
Akamai engineering has adopted new technology concepts to enhance and expand routing capabilities at the edge. Previously, Akamai?s traffic-steering capabilities were mainly focused on DNS-based routing. In this article, we would like to give you an in…
Cutting the Red Tape: Lessons Learned from CyberThreats 2021
If I had a dollar for every time I heard the phrase ?digital transformation,? I would have a lot of dollars. I?m sure you would too. We?d have even more if we counted the term ?Zero Trust.? (Maybe we should start counting them, now that I think about i…
All Access Is (or Should Be) Remote Access
With the transition to remote work, we often hear the term remote access used in unison. Typically, remote work application access is facilitated via a remote access mechanism and, presumably, local work application access is facilitated via a local ac…
Why Zero Trust Needs the Edge
Backhauling traffic destroys performance, and backhauling attack traffic can destroy even more. Nevertheless, in a traditional security deployment model, we are faced with the lose-lose options of either backhauling all traffic to the security stack or…