The Philippine Navy (PN) has been pursuing the acquisition of new guided-missile Corvettes as it continues to improve its combat capability as part of the service’s modernization program.Two new corvettes are eyed under the Corvette Acquisition P…
HTTP/2 Request Smuggling
HTTP Request Smuggling (also known as an HTTP Desync Attack) has experienced a resurgence in security research recently, thanks in large part to the outstanding work by security researcher James Kettle. His 2019 Blackhat presentation on HTTP Desync att…
General Electric robot navigates uncharted terrain in US Army demo
In Army Research Laboratory program, General Electric teaches a robot how to navigate off-road on its own.
Putting Purpose First as an Akamai Co-Op
As I began my CSR Co-op position this year, I wanted to see up-close how a corporate foundation works. What I’ve found is that the work the Akamai Foundation does around the world is inspiring! Whether it’s partnering with STEM educators, responding to…
Akamai’s Commitment to Reliability
For more than 20 years, Akamai has worked very hard to earn the trust and confidence of our customers and partners by developing services that can be relied upon to be available and secure at all times.
Zeek in Action Videos
This is a quick note to point blog readers to my Zeek in Action YouTube video series for the Zeek network security monitoring project. Each video addresses a topic that I think might be of interest to people trying to understand their network usin…
Zero Trust Should Not Give IT a Bad Name
Maybe you?ve just found out that your company?s IT organization is implementing Zero Trust. Does that mean they don?t trust you? ?Zero Trust? sure sounds that way. Maybe you?ve read about it online or heard somebody talk about it in terms that equate Z…
Holiday Readiness, Part One: What you Should be Thinking About Four Months Out?Security
The beginning of August is upon us, and if you haven?t already started thinking about the busiest time of the year, now is a good time to do so. Whether you?re an experienced veteran of managing peak traffic or new to the game, Q4 can bring surprises w…
Payment Security: Understanding the Four Corner Model
Introduction Online shopping digital payment transactions may seem quite simple, but in reality, just one single transaction sets off multiple, long-chain reactions. The Payment Card Industry comprises debit cards, credit cards, prepaid, e-purse/e-wall…
Software-Defined Networking Concept Adoption at Akamai
Akamai engineering has adopted new technology concepts to enhance and expand routing capabilities at the edge. Previously, Akamai?s traffic-steering capabilities were mainly focused on DNS-based routing. In this article, we would like to give you an in…