Location- and Device-agnostic Security for the Mobile Workforce

Location- and Device-agnostic Security for the Mobile Workforce

I've spent my entire career in technology and can still recall the time when a desktop PC was the only way to work. (Truth be told, I'm also old enough to remember ...
SolarWinds Hack and the Case of DNS Security

SolarWinds Hack and the Case of DNS Security

It's not news that some of the top government agencies and companies in the world were victims of the SolarWinds attack. At this point, I can say it's the reason I didn't ...
What's New in Security, Part 2

What’s New in Security, Part 2

Welcome to the Akamai Platform Update! We're presenting an entire week of learning about Akamai's recent product updates. Each day, we'll highlight our latest innovations in each area of the Akamai Intelligent ...
Akamai Enhances its Cloud Secure Web Gateway with DLP, Application Control and DNS over TLS (DoT)

Akamai Enhances its Cloud Secure Web Gateway with DLP, Application Control and DNS over TLS (DoT)

Last March, Akamai announced the launch of its secure web gateway delivered at the edge, to help enterprises further accelerate their transition to a new security architecture based on Zero Trust and ...
Akamai, CISA, and CIS Join Forces to Improve SLTT Cyber Defenses

Akamai, CISA, and CIS Join Forces to Improve SLTT Cyber Defenses

Cybercriminals continue to target U.S. state, local, tribal, and territorial (SLTT) government organizations. In 2019, there were more than 100 ransomware attacks -- including an attack on Baltimore's IT systems that locked ...
Enterprise Threat Protector Now Includes One-Click Performance Optimization for Microsoft 365

Enterprise Threat Protector Now Includes One-Click Performance Optimization for Microsoft 365

Microsoft 365 is becoming the essential productivity suite for enterprises. Over 1 million companies have now signed up for the service, and every month there are more than 200 million active users ...
enterpriseone.png

Trust As The Foundation Of Security

Our customers are moving more workloads to the cloud. No surprise there. The siren song of agility, scale, and cost savings can't be resisted. But as we highlighted earlier, security fundamentals are ...
U.S. Mid-term Elections and Akamai Enterprise Threat Protector

U.S. Mid-term Elections and Akamai Enterprise Threat Protector

The last few years have witnessed seismic changes in the world's political landscape and the way elections have been conducted. As of yet, there's no conclusive evidence that the results and outcomes ...
Your Users Have Left the Building: Now What?

Your Users Have Left the Building: Now What?

The dramatic growth of mobile devices, the widespread availability of always-on fast wireless networks, and the rapid adoption of cloud applications have transformed the viability of remote working. Employers are increasingly adopting ...