Akamai hit a new milestone last week when web traffic delivered across our edge network peaked at 200 terabits per second (Tbps).
The Akamai Foundation: Our Chance to Give Back
The Akamai Foundation was set up in 2018 to improve the impact and focus of our long-term philanthropic activities.
Threat Advisory – DCCP for (D)DoS
Recent attacks against Akamai customers have leveraged a networking protocol known as protocol 33, or Datagram Congestion Control Protocol (DCCP).
Speak like a local: Ten useful Spanish expressions with the word ‘water’
In hot and sunny Spain, ‘agua’ is certainly a word you need to know. But there are also many handy expressions which include the word for water, from the Spanish version of being ‘in dire straits’ to what you call a ‘party pooper’.
…
4 Techniques for Early Ransomware Detection
If you receive a ransom note, it?s already too late. Detect and stop ransomware attacks early in the kill chain with these 4 techniques.
Is Philippine Army leaning on Thailand’s Chaiseri First Win 2 MRAP for its Light Tactical Vehicle requirements?
The recent news regarding the signing of a Defense Industry Memorandum of Understanding (MOU) between the Philippines and Thailand was an important milestone for the two neighbouring countries, as Thailand’s local defense industry takes off and i…
The Edge is Becoming More Critical in a World of 5G and IoT
The edge is becoming more critical in a world of 5G and IoT. I’ve seen the evolution from 1x to 3G to 4G and now 5G over the many years I’ve worked in the mobile space, and 5G and IoT will drive the biggest changes we have seen on the edge in 10 or 20 …
Akamai Launch Cohort 2 of Accelerator Program For Early-Stage Innovations in Water
Akamai Technologies India Pvt. Ltd. has chosen the grantees for Cohort 2 of Accelerator Program for Early-Stage Innovations in Water.
Finding the Cracks in the Wall – How Modern Scams Bypass MFA
In my previous blog, I discussed the important role multi-factor authentication (MFA) plays in further securing access to enterprise and consumer services. We also established the fact that although MFA increases authentication security and decreases t…
Finding the Cracks in the Wall – The Hazard of Single Authentication Factor
The use of authentication factors, one of the most fundamental and well understood concepts in information security, enables secure access to applications, services, and networks. It can affect an enterprise’s security posture, however, as the drastic …