Akamai is committed to collaboration that inspires worldwide change. We know it’s not enough to be environmentally conscious solely in our own business. To make a true impact on climate change, we need to use our unique position as a global corporation…
The Importance of Education in Furthering the Sustainability Agenda
Author: Mark Porter, Director, Supply Chain & International Collaboration, Renewable Energy Buyers Alliance (REBA)
Mark Porter moved to REBA from Rocky Mountain Institute’s Business Renewables Center (BRC) initiative in March 2019. Mark continues to s…
Our ESG Commitment: Investing in a Better World
Environmental, social, and governance (ESG) issues are quickly emerging as a key concern for investors. To use a musical analogy, the bow is just resting on the first string, with more notes sure to follow. At Akamai, our ESG instrument is well tuned a…
Distinguishing Among DNS Services Part 3: Investment and Innovation
This is Part 3 of a 3-part blog series highlighting some of the distinguishing aspects of Akamai’s authoritative DNS services, Edge DNS and Global Traffic Management. Part 1 focused on Akamai’s DNS platform and what sets it apart. Part 2…
Working Together with Our Customers to Build a Sustainable Future
By now, we hope you’ve read Monday’s and Tuesday’s blog posts announcing the release of our annual sustainability report, our sustainability program, and the technical innovation behind it.
When Destiny is Knocking on Your Door Again – Data Mining CDN Logs to Refine and Optimize Web Attack Detection
A few years ago, I wrote a blog post trying to explain, with humor, why choosing application security as a career path is destiny derived by my parents calling me “Or”, and why a personal name that is a conditional word can sometimes be challenging in …
How Client-Side Protection & Compliance Detects Real-World Magecart Attacks
In this blog, we will take a look at and break down a recent Magecart attack detected and mitigated by Client-Side Protection & Compliance. The impacted customer operates a large international e-commerce business in which one of its websites was compro…
What happens when your vulnerability is weaponized for botnet proliferation
This post will focus on the weaponization of a few of the exploits only, as Sarit and Ofir documented everything else.
Maintaining an Energy-Efficient Edge Platform
Over the past 20 years, we’ve seen a lot of growth at Akamai. When I started at Akamai, we used to have traffic peaks of almost 200 Mbps. From that fledgling startup, Akamai has now grown to such a scale that we almost doubled network capacity in 2020 …
Minecraft Players are Targets Even Off the Network
When we write the SOTI and talk about attacks against gamers, we spend a good deal of time focusing on network-level events, such as DDoS and credential stuffing.