DDoS Extortion Blog, 10.27_pic1.png

2020 DDoS Extortion Campaign — A Sequel More Thrilling Than the Original

As you might imagine, as the go-to enterprise DDoS mitigation experts, our phones have been "ringing off the hook" as the global extortion DDoS campaign sequel rages on. It's bigger, badder, and ...
figure1.png

Akamai Named Gartner Magic Quadrant Leader for Fourth Consecutive Year

Gartner published its 2020 Magic Quadrant for Web Application Firewalls (WAF) and named Akamai a Leader for the fourth consecutive year. Gartner's high distinction is market recognition of our completeness of vision ...
Day4_Blog2_EAA1.jpg

Better Together: Akamai Enhances Zero Trust Network Access with CrowdStrike

More than ever before, users and applications no longer reside at the office. Organizations are managing a mobile and globally distributed workforce that needs access to corporate systems, applications, and data from ...
Rethinking Defensive Strategy at the Edge, Part 3: Strategies for Protective Action

Rethinking Defensive Strategy at the Edge, Part 3: Strategies for Protective Action

Our three-part blog series, Re-thinking Defensive Strategy at the Edge, has been focusing on outlining a new defensive edge strategy for today's enterprise. We began with a discussion of data and indicators ...
Rethinking ZTA defense Strategy GraphicsBlog_9.16.20.png

Rethinking Defensive Strategy at the Edge, Part 2: Risk Signals as Security Controls

In the first post in our blog series Rethinking Defensive Strategy at the Edge, we began to outline why a new defensive edge strategy is needed for today's enterprise. As previously mentioned, ...
securityfund1.png

Security Fundamentals Are Key To Successful Cloud Migration

Earlier I wrote about the importance of patching, or more accurately the importance of transferring the need to patch (& the associated risk) to someone else by using their cloud security service ...
4 Critical Elements Your Next Security Solution Must Have

4 Critical Elements Your Next Security Solution Must Have

Security is essential to the success of any digital business. But there's one thing you can always count on: security-related incursions are inevitable. And the results can be devastating. Security breaches erode ...
3 Reasons Your Business Needs Security at the Edge

3 Reasons Your Business Needs Security at the Edge

| | Akamai Edge, cloudsecurity, edge
Security at the edge is an approach to defending your business from security threats by deploying defense measures closer to the point of attack and as far away from your assets (your ...