identity management
What’s the point of habitual cookie consent? Analytics?
Mayur Upadhyaya | | CCPA, CIAM, Commerce, cookieconsent, dap, dmp, firstpartydata, GDPR, iab, identity management, personalization, Retail & Commerce, tcf
Last week I read an online post about schoolchildren who are taught in their IT lessons to just accept cookie consent pop-ups when they see them on the screen! That really is ...
Going Beyond Advertising: Revenue Diversification in Publishing
Paul Jackson | | cloud computing, identity management, journalism, Media Delivery, Mobile Experience, publishers, Publishing, revenue, SBN News, Web Performance
The pandemic has had a profound short-term effect on publishers around the world -- a jump in readership somewhat dampened by disappearing advertising revenue. In many media firms, the digital channel has ...
Safeguard Identity Data at the Source
When your customers create an account on your website or application, they are entrusting their valuable information with you in order to establish a relationship. To maintain that relationship, they need to ...
4 Tips for a Great CIAM RFP
Requests for proposals (RFPs) are a good way to start the product evaluation process as well as help clarify the project's scope and requirements. RFPs give you the ability to compare products ...
Cyberattacks Evolve as the Hospitality and Travel Industry Adapts
Ashitha Bhanu | | Cloud Security, Commerce, Connected Devices, covid19, Enterprise Threat Protector, hospitalityandtravel, identity management, securityawareness, zero trust
While the world fights against the COVID-19 pandemic, cybercriminals are out in full force with a multitude of scams designed to take advantage of the confusion and panic. COVID-19 has -- by ...
What’s Next in Security
John Summers | | apisecurity, Cloud Security, ddos, digitalbusiness, dns, edge computing, Enterprise Application Access, Enterprise Threat Protector, identity management, riskmitigation, zero trust
Whenever we talk about what's next for Akamai's security portfolio, we clearly want to look at the challenges that are top of mind for our customers -- both today and tomorrow. And ...
What’s New in Security, Part 2
Lorenz Jakober | | Carrier & Network, dns, edgedns, Enterprise Application Access, Enterprise Threat Protector, enterpriseapplicationaccess, enterprisethreatprotector, globaltrafficmanagement, identity management, identitycloud, Standards and Protocols, zero trust
Welcome to the Akamai Platform Update! We're presenting an entire week of learning about Akamai's recent product updates. Each day, we'll highlight our latest innovations in each area of the Akamai Intelligent ...
What’s New in Customer Identity and Access Management
We all know that the ability to accurately identify, understand, and engage our customers across multiple channels and digital touchpoints is absolutely vital to the digital customer experience and business. This couldn't ...
New Guide: How Akamai Helps You Protect Privacy Data
Laws and regulations related to personally identifiable information (PII) are continuously being enacted around the world as data breaches and abuses persist. According to the February 2020 United Nations Conference on Trade ...
Out of the Grace Period: Trust and Communication Rises in a Post-CCPA World
Six months ago, the California Consumer Privacy Act (CCPA) was put into effect, granting California residents increased rights over how their personal data is gathered and shared by the companies they interact ...

