On October 2020, the Akamai Technical Enablement and Education (TE&E) Team — responsible for creating product-training certifications for employees (Global Services and Support [GSS]), customers (Akamai University), and channel partners (Advanced Part…
Akamai Prolexic and Equinix Cloud Exchange Bring DDoS Defense Closer to the Origin
In terms of cyberthreats and digital risk, 2020 has been all about distributed denial-of-service (DDoS) attacks.
Kali Linux + Mr. Robot ARG Society
Many of you may have known about the show Mr Robot and its unique connection to Kali Linux. But there is a little bit more that we have not talked about due to NDAs. But it appears the mystery is over, the red tape has been removed, and we now wanted t…
Smart DNS: Emerging Requirements for DNS Encryption
This blog post — the fourth in a series — will discuss how smart DNS resolvers can enhance ongoing ISP and MNO network transformation efforts, such as the transition to 5G, better integration of Wi-Fi, and new network designs that optimize the edge …
Research & Academic
We introduce a novel machine learning approach that uses network flows to generate application-level representation of public and private cloud networks. This will greatly simplify the journey to a micro-segmented network.
Is Italy’s Leonardo involved in engine supply for T129B Attack Helicopters for the Philippine Air Force?
Previous posts we made confirmed that the Department of National Defense (DND) already released the Notice of Award (NOA) for the Philippine Air Force’s Attack Helicopter Acquisition Project in favor of Turkey’s Turkish Aerospace Industries (TAI)…
Launching a New Game Studio and Planning for Growth
So, you’re starting your own game studio. This is an incredible opportunity! You and your team get to start fresh and build the game of your dreams! But, let’s be honest, if you have just founded your own game studio, odds are that you’re not a technic…
Oracle Strengthens Interoperability and User Experience with General Availability of FIDO2 WebAuthn Support for Cloud Identity
“Given the distributed nature of today’s technology environment, zero trust has become the standard for security. Every interaction must be authenticated and validated for every user accessing every system or application every time. To that end, intero…
How the Edge Improves Microservices
Microservice architecture has transformed the way we develop and operate our applications. Microservices aren’t a technology or a programming language. Instead, they create a structure for designing and building applications based on the idea that the …