CyberattacksBlog_10.26_pic2.png

Cyberattacks Evolve as the Hospitality and Travel Industry Adapts

While the world fights against the COVID-19 pandemic, cybercriminals are out in full force with a multitude of scams designed to take advantage of the confusion and panic. COVID-19 has -- by ...
Recap_Blog3_pic1_Day5.png

What’s Next in Security

Whenever we talk about what's next for Akamai's security portfolio, we clearly want to look at the challenges that are top of mind for our customers -- both today and tomorrow. And ...
What's New in Security, Part 2

What’s New in Security, Part 2

Welcome to the Akamai Platform Update! We're presenting an entire week of learning about Akamai's recent product updates. Each day, we'll highlight our latest innovations in each area of the Akamai Intelligent ...
Akamai Enhances its Cloud Secure Web Gateway with DLP, Application Control and DNS over TLS (DoT)

Akamai Enhances its Cloud Secure Web Gateway with DLP, Application Control and DNS over TLS (DoT)

Last March, Akamai announced the launch of its secure web gateway delivered at the edge, to help enterprises further accelerate their transition to a new security architecture based on Zero Trust and ...
Akamai, CISA, and CIS Join Forces to Improve SLTT Cyber Defenses

Akamai, CISA, and CIS Join Forces to Improve SLTT Cyber Defenses

Cybercriminals continue to target U.S. state, local, tribal, and territorial (SLTT) government organizations. In 2019, there were more than 100 ransomware attacks -- including an attack on Baltimore's IT systems that locked ...
Enterprise Threat Protector Now Includes One-Click Performance Optimization for Microsoft 365

Enterprise Threat Protector Now Includes One-Click Performance Optimization for Microsoft 365

Microsoft 365 is becoming the essential productivity suite for enterprises. Over 1 million companies have now signed up for the service, and every month there are more than 200 million active users ...
Tale of the Tape: Top 5 Reasons Phishing Attacks Haven't Dried Up

Tale of the Tape: Top 5 Reasons Phishing Attacks Haven’t Dried Up

One of my favourite websites is archive.org (OK, so I'm a nerd). For anyone not familiar with this website, it's essentially a time machine that allows you to go back and look ...
Simplifying Data Center and IaaS Visibility and Protection

Simplifying Data Center and IaaS Visibility and Protection

Helping customers further secure their on-premises data centers and IaaS deployments is an interesting new use case for our Enterprise Threat Protector service ...
Enabling Workforce Productivity in Challenging Times

Enabling Workforce Productivity in Challenging Times

As the world shifts to an increasingly virtual environment, Akamai continues to be at the forefront of helping customers enable workforce productivity with Akamai's Enterprise Application Access and Enterprise Threat Protector. From ...
Business Continuity and Security in an Uncertain Global Environment

Business Continuity and Security in an Uncertain Global Environment

The need for companies to quickly enable remote access to business-critical applications was highlighted in a recent Akamai blog -- Enabling Business Continuity in an Uncertain Global Environment ...