Akamai Technologies
Follow
66 Followers
Follow Akamai Technologies on their other social channels!
About Us
Founded:
1998
Company Size:
5001-10000 employees
Company Type:
Public
Location:
Cambridge, MA (HQ) / Global
Website:
If you've ever shopped online, downloaded music, watched a web video or connected to work remotely, you've probably used Akamai's cloud platform. Akamai helps businesses connect the hyperconnected, empowering them to transform and reinvent their business online. We remove the complexities of tech ...
Read more
Promoted Content
The State of Security in State & Local Government
Follow
130
Retailers capitalize on mobile experiences to generate record revenue during Black Friday and Cyber Monday
The results are in, Black Friday and Cyber Monday broke all records in 2017 as the total revenue for these days exceeded $11.5 billion. Anticipating that more consumers would shop online, retailers invested in digital experiences and geared up for the holidays by (i) stocking fewer items in stores to reduce inventory costs and (ii) hiring few seasonal workers. Retailers' predictions were accurate, and their investment in digital experiences paid off, as close to 40% of the Black Friday revenue w ...
Follow
298
Do You Believe in Serendipity?
In December 2016, after a month of mountain bike racing and touring in Nepal, I commenced the Executive Program in General Management at MIT. The first term was at Sloan School of Management in Cambridge and for the first time in my life, I finally could relate to studying. In fact, I was even enjoying it! One of the many practical subjects was "How Companies Become Platform Leaders" by Professor Pierre Azoulay with references to MIT alum companies like Dropbox; and a fascinating case study ...
Follow
369
Layered Security Without the Layered Complexity
With the recent influx of news reports regarding security incidents, more Chief Information Security Officers (CISOs), Chief Information Officers (CIOs), and IT professionals are reviewing current security infrastructures, policies, and practices to identify potential weaknesses in their security posture. This has long been best practice, but with the progressive use of various attack and threat vectors now employed by malicious actors against businesses, this practice must be constantly in ...
Follow
525
Data Breaches and Credential Stuffing: Don’t Get TKOd
By Patrick Sullivan It has been a very rough month for the information security community.  It feels like we've been on the losing end of a championship fight against Floyd Mayweather. The body shots started with Equifax and continued with attacks on the US Government. The assault included a couple of combination shots as Equifax expanded the scope of their breach by adding millions of additional impacted accounts and as reports emerged that this was not the first breach for Equ ...
Follow
407
Cybersecurity Executive Order 13800: More than a Risk Assessment?
Most folks around the Washington DC beltway have heard the cybersecurity Executive Order (EO 13800 - Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure) referred to as a simple risk assessment. But the reality is that it is much more about broadly modernizing federal IT infrastructure and improving the cybersecurity of our federal networks. Sure, the first step is a risk management report, but the next focuses on procurement of shared IT, including cloud and cybe ...
Follow
369
What makes a good “DNS Blacklist”? – Part 2
In "What makes a good 'DNS Blacklist'? - Part 1", we explored the background and factors that have gone into Akamai's thinking behind New security products like Enterprise Threat Protect (ETP). This article continues with a list of factors and questions to ask any DNS Threat Feed providers, including Akamai. What should enterprises look for in the DNS Threat Policies? DNS Threat Policies are more than a DNS Blacklist.  The term "DNS threat policy" refers to a combination of three factors: ...
Follow
1027
What makes a good “DNS Blacklist”? – Part 1
Akamai has just launched the Enterprise Threat Protection (ETP) platform. ETP is built on Akamai's global AnswerX Cloud that now reaches 28 countries and is expanding to new countries every month. As a new player in Cloud DNS resolver services, competitors will ask "why Akamai?" or "what gives Akamai the knowledge and capacity to build effective DNS blacklists?" These are good questions from our competition, and are also questions that our customers should ask. Let's explore why Akamai is in a u ...
Follow
398
Taking the Fight Where It Belongs
By Robert Mahowald  Read the whole blog here > A surprising set of facts emerged from the most recent quarterly installment of IDC's CloudView 2017 survey (February 2017, n= 6,212 tech buyer respondents in 31 countries): Year-over-year, the percent of organizations sourcing their tech capability from cloud providers grew 137%. But that's not all that's new: In large companies, respondents choosing net new and replacement technology for their companies stated that they will go ...
Follow
943
Reducing Infrastructure Cost with new Enterprise Application Access Architecture
By Robert Berlin June 14, 2017   In an earlier blog, "Remote Access no longer needs to be Complex and Cumbersome", I wrote about the new game-changing remote access solution available from Akamai called Enterprise Application Access (EAA). My thesis was that in our cloud-first, mobile-dominated world, providing access to behind-the-firewall applications need not be as complex as with today's traditional DMZ/VPNs infrastructure.   How can this seemingly counter-intuitive sta ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

DUHK: The Technique That Got the VPN Compromised
Views: 1282 / December 10, 2017
What is Docker? [Series]
Views: 2098 / December 9, 2017
Wanna-Cry Ransomware
Views: 2085 / December 9, 2017
The Abyssal Depth of the Deep Web
Views: 2060 / December 8, 2017
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel