To Akamai’s Co-Founder Danny Lewin, calling someone a “Titan” was the highest praise he would give. Danny himself was a remarkably talented and hard-working leader whose heart, passion, and spirit still inspire us.
Emerging Edge Computing Use Cases
The first rule of edge compute thought leadership is: don’t overuse the term edge. Over the course of my blog series on the topic, I have defined the edge, explained edge computing, and discussed the economics of edge computing.
Tax Season: Criminals Play the Numbers Game Too
Criminals love tax season. The stress and urgency surrounding this time of year makes the victim pool highly vulnerable to various types of schemes.
Additional Cyclone-class littoral patrol vessels to bridge the gap with the Philippine Navy’s Littoral Combat Force
The Philippine Navy (PN) has been moving away from older, less capable naval assets and has planned to acquire newer, more capable and better performing naval assets for the service to improve its overall capability, make use of new technology to…
The Origins of the Names TaoSecurity and the Unit Formerly Known as TAO
What are the origins of the names TaoSecurity and the unit formerly known as TAO? IntroductionI’ve been reading Nicole Perlroth’s new book This Is How They Tell Me the World Ends. Her discussion of the group formerly known as Tailored Access…
2021: Volumetric DDoS Attacks Rising Fast
In our 2020 DDoS retrospective, we highlighted the twists and turns of a very, very active threat landscape. As a quick refresher, we mitigated some of the largest attacks ever seen (1.44 Tbps and 809 Mpps);
5 Best Smart Showers [REVIEWS and BUYING TIPS]
Our Top Picks: Best Overall Smart Shower with Controller MOEN U SHOWER CONTROLLER Moen allows you to control your shower through your smartphone, voice command, or through soft touch buttons to make your shower experience more enjoyable. Pros: Wi…
4 Helpful Features for Centra Users – Policy Monitoring and More
Blog Blog https://www.akamai.com/blog CySecBot CySecBot
CVE-2020-15915 — Quest for KACE blind SQLi
At Akamai, the Enterprise Security Red Team (ESRT) continuously strives to evaluate the security of both our external and internal services.
Authentication: Lessons Learned From Microsoft Exchange And F5 Big-IP Hacks
The past month has been a very dynamic time in the world of security for hackers and threat researchers, but it has been an extended nightmare for CSOs responsible for securing their enterprise networks.