<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
<channel>	<title>Blog</title>
	<link>https://www.akamai.com/blog</link>
	<description>Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.</description>
	<language>en</language>
	<copyright>Akamai Technologies</copyright>
<item>
	<title>PGBouncer: Connection Pooling for Managed PostgreSQL Databases</title>
	<description>Learn how enabling PGBouncer reduces connection overhead, frees up server resources for query execution and disk caching, and improves performance at scale.</description>
	<link>https://www.akamai.com/blog/performance/2026/apr/pgbouncer-connection-pooling-managed-postgresql-databases</link>
	<author>Katie Sedlar</author>
	<guid>https://www.akamai.com/blog/performance/2026/apr/pgbouncer-connection-pooling-managed-postgresql-databases</guid>
	<pubDate>Thu, 02 Apr 2026 17:00:00 UTC</pubDate>

</item>
<item>
	<title>Compliance Won’t Save Healthcare: Reducing the Blast Radius Will</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2026/apr/compliance-wont-save-healthcare-reducing-blast-radius-will</link>
	<author>Clint Huffaker</author>
	<guid>https://www.akamai.com/blog/security/2026/apr/compliance-wont-save-healthcare-reducing-blast-radius-will</guid>
	<pubDate>Thu, 02 Apr 2026 12:00:00 UTC</pubDate>

</item>
<item>
	<title>How Managed Databases Are Transforming Today’s IT Landscape</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2026/apr/managed-databases-transforming-todays-it-landscape</link>
	<author>Amit Mohanty</author>
	<guid>https://www.akamai.com/blog/developers/2026/apr/managed-databases-transforming-todays-it-landscape</guid>
	<pubDate>Wed, 01 Apr 2026 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Digital Transformation in Africa: Security, Scale, and Control </title>
	<description></description>
	<link>https://www.akamai.com/blog/partners/2026/apr/digital-transformation-africa-security-scale-control</link>
	<author>Imane Nkairi</author>
	<guid>https://www.akamai.com/blog/partners/2026/apr/digital-transformation-africa-security-scale-control</guid>
	<pubDate>Wed, 01 Apr 2026 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Enterprise Application Access Achieves FedRAMP Moderate Authorization</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2026/mar/enterprise-application-access-fedramp-moderate-authorization</link>
	<author>Shiran Guez</author>
	<guid>https://www.akamai.com/blog/security/2026/mar/enterprise-application-access-fedramp-moderate-authorization</guid>
	<pubDate>Tue, 31 Mar 2026 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Magento Polyshell — The Latest Magento Threat (APSB25-94)</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2026/mar/magento-polyshell-latest-magento-threat-apsb25-94</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2026/mar/magento-polyshell-latest-magento-threat-apsb25-94</guid>
	<pubDate>Fri, 27 Mar 2026 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Telnyx PyPI Compromise and the 2026 TeamPCP Supply Chain Attacks</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2026/mar/telnyx-pypi-2026-teampcp-supply-chain-attacks</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2026/mar/telnyx-pypi-2026-teampcp-supply-chain-attacks</guid>
	<pubDate>Fri, 27 Mar 2026 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Extend Application Security Visibility from Code to Runtime</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2026/mar/extending-application-security-visibility-code-runtime</link>
	<author>Sandra Murphy, Danielle Walter &amp; John Leon</author>
	<guid>https://www.akamai.com/blog/security/2026/mar/extending-application-security-visibility-code-runtime</guid>
	<pubDate>Fri, 27 Mar 2026 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Leads the Way: 2026 GigaOm Radar for Microsegmentation</title>
	<description>Akamai Guardicore Segmentation, a Leader and Fast Mover in the 2026 GigaOm Radar for Microsegmentation report, balances innovation with platform strength.</description>
	<link>https://www.akamai.com/blog/security/2026/mar/akamai-leads-2026-gigaom-radar-microsegmentation</link>
	<author>Jacob Abrams</author>
	<guid>https://www.akamai.com/blog/security/2026/mar/akamai-leads-2026-gigaom-radar-microsegmentation</guid>
	<pubDate>Wed, 25 Mar 2026 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Machine Learning Operations: Yesterday, Today, and Tomorrow</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2026/mar/machine-learning-operations-yesterday-today-tomorrow</link>
	<author>Konstantin Zilberberg</author>
	<guid>https://www.akamai.com/blog/security/2026/mar/machine-learning-operations-yesterday-today-tomorrow</guid>
	<pubDate>Wed, 25 Mar 2026 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Microsegmentation and Zero Trust: Control the Blast Radius by Design</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2026/mar/microsegmentation-zero-trust-control-blast-radius-design</link>
	<author>Dennis Birchard</author>
	<guid>https://www.akamai.com/blog/security/2026/mar/microsegmentation-zero-trust-control-blast-radius-design</guid>
	<pubDate>Tue, 24 Mar 2026 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Farming at the Edge: Where Autonomous Robots and Edge Compute Meet</title>
	<description></description>
	<link>https://www.akamai.com/blog/edge/2026/mar/farming-edge-autonomous-robots-edge-compute-meet</link>
	<author>MacKenzie Adam</author>
	<guid>https://www.akamai.com/blog/edge/2026/mar/farming-edge-autonomous-robots-edge-compute-meet</guid>
	<pubDate>Mon, 23 Mar 2026 13:00:00 UTC</pubDate>

</item>
<item>
	<title>CVE-2026-31979: The Symlink Trap — Root Privilege Escalation in Himmelblau </title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2026/mar/cve-2026-31979-symlink-root-privilege-escalation-himmelblau</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2026/mar/cve-2026-31979-symlink-root-privilege-escalation-himmelblau</guid>
	<pubDate>Fri, 20 Mar 2026 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Helps Authorities Disrupt the World’s Largest IoT Botnets</title>
	<description>The U.S. DOJ recently disrupted several large and powerful DDoS botnets and shut down their related DDoS-for-hire services with Akamai’s help.</description>
	<link>https://www.akamai.com/blog/security-research/2026/mar/akamai-helps-disrupt-worlds-largest-iot-botnets</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2026/mar/akamai-helps-disrupt-worlds-largest-iot-botnets</guid>
	<pubDate>Thu, 19 Mar 2026 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Top 10 Threats Related to Agent Skills</title>
	<description>Read about the top 10 critical threats related to Agent Skills that security teams should consider while building and evaluating agents.</description>
	<link>https://www.akamai.com/blog/security/2026/mar/top-10-threats-related-agent-skills</link>
	<author>Tamar Didi &amp; Maxim Zavodchik</author>
	<guid>https://www.akamai.com/blog/security/2026/mar/top-10-threats-related-agent-skills</guid>
	<pubDate>Thu, 19 Mar 2026 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Join Us at Wasm I/O 2026</title>
	<description> Akamai is sponsoring Wasm IO 2026 as part of our commitment to WebAssembly. Get all the details.</description>
	<link>https://www.akamai.com/blog/developers/2026/mar/join-us-wasm-io-2026</link>
	<author>Thorsten Hans</author>
	<guid>https://www.akamai.com/blog/developers/2026/mar/join-us-wasm-io-2026</guid>
	<pubDate>Tue, 17 Mar 2026 17:00:00 UTC</pubDate>

</item>
<item>
	<title>The Agentic Security Crisis: Why You Need to Act Now</title>
	<description></description>
	<link>https://www.akamai.com/blog/trends/2026/mar/agentic-security-crisis-why-you-need-act-now</link>
	<author>Ram Iyer &amp; Jimmy Mesta</author>
	<guid>https://www.akamai.com/blog/trends/2026/mar/agentic-security-crisis-why-you-need-act-now</guid>
	<pubDate>Tue, 17 Mar 2026 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Apps, APIs, and DDoS 2026: The Industrialization of Cyberattack Campaigns</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2026/mar/apps-apis-ddos-2026-industrialization-cyberattack-campaigns</link>
	<author>Kimberly Gomez</author>
	<guid>https://www.akamai.com/blog/security/2026/mar/apps-apis-ddos-2026-industrialization-cyberattack-campaigns</guid>
	<pubDate>Tue, 17 Mar 2026 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai and Google: Advancing Data-Driven Marketing with Google Tag Gateway for Advertisers</title>
	<description></description>
	<link>https://www.akamai.com/blog/edge/2026/mar/akamai-google-data-driven-marketing-google-tag-gateway</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/edge/2026/mar/akamai-google-data-driven-marketing-google-tag-gateway</guid>
	<pubDate>Mon, 16 Mar 2026 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Secure the AI Factory: Data Center Security for Accelerated Intelligence</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2026/mar/secure-ai-factory-data-center-security-accelerated-intelligence</link>
	<author>Clint Huffaker</author>
	<guid>https://www.akamai.com/blog/security/2026/mar/secure-ai-factory-data-center-security-accelerated-intelligence</guid>
	<pubDate>Mon, 16 Mar 2026 12:00:00 UTC</pubDate>

</item>
<item>
	<title>AI in Vulnerability Discovery: A Call for Human Oversight and Caution</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2026/mar/ai-vulnerability-discovery-human-oversight-caution</link>
	<author>Larry Cashdollar &amp; Kyle Lefton</author>
	<guid>https://www.akamai.com/blog/security-research/2026/mar/ai-vulnerability-discovery-human-oversight-caution</guid>
	<pubDate>Fri, 13 Mar 2026 08:00:00 UTC</pubDate>

</item>
<item>
	<title>Fortify Your Network Security from Emerging Geopolitical Cyberthreats</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2026/mar/fortify-network-security-emerging-geopolitical-cyberthreats</link>
	<author>Sandeep Rath, Nitin Singla, Ankita Kharya &amp; Ryan Gao</author>
	<guid>https://www.akamai.com/blog/security/2026/mar/fortify-network-security-emerging-geopolitical-cyberthreats</guid>
	<pubDate>Fri, 13 Mar 2026 05:00:00 UTC</pubDate>

</item>
<item>
	<title>RSAC 2026: Tag in a Partner for the AI Security Showdown</title>
	<description>Legacy security wasn't built for autonomous AI. See how Akamai partners are stepping into the ring to build trust and secure the agentic enterprise.</description>
	<link>https://www.akamai.com/blog/partners/2026/mar/rsac-2026-tag-partner-ai-security-showdown</link>
	<author>Nick Watkins</author>
	<guid>https://www.akamai.com/blog/partners/2026/mar/rsac-2026-tag-partner-ai-security-showdown</guid>
	<pubDate>Thu, 12 Mar 2026 19:00:00 UTC</pubDate>

</item>
<item>
	<title>Build Serverless Functions with Zero Cold Starts: WebAssembly and Spin</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2026/mar/build-serverless-functions-zero-cold-starts-webassembly-spin</link>
	<author>Thorsten Hans</author>
	<guid>https://www.akamai.com/blog/developers/2026/mar/build-serverless-functions-zero-cold-starts-webassembly-spin</guid>
	<pubDate>Thu, 12 Mar 2026 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Inside Akamai: How Offload and Performance Drive Speed and Resiliency</title>
	<description></description>
	<link>https://www.akamai.com/blog/performance/2026/mar/inside-akamai-offload-performance-drive-speed-resiliency</link>
	<author>Patrick Saweikis</author>
	<guid>https://www.akamai.com/blog/performance/2026/mar/inside-akamai-offload-performance-drive-speed-resiliency</guid>
	<pubDate>Wed, 11 Mar 2026 12:00:00 UTC</pubDate>

</item>
<item>
	<title>The Mistral–Koyeb Deal and the Shift Toward Architectural Maturity in AI</title>
	<description></description>
	<link>https://www.akamai.com/blog/trends/2026/mar/mistral-koyeb-deal-shift-architectural-maturity-ai</link>
	<author>Vineeth Varughese</author>
	<guid>https://www.akamai.com/blog/trends/2026/mar/mistral-koyeb-deal-shift-architectural-maturity-ai</guid>
	<pubDate>Wed, 11 Mar 2026 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Build Transformative Security with AI-Powered WAF Detections</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2026/mar/build-transformative-security-ai-powered-waf-detections</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/2026/mar/build-transformative-security-ai-powered-waf-detections</guid>
	<pubDate>Tue, 10 Mar 2026 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Avoid Evasive Scraping with Stronger Content Protection</title>
	<description>Learn about the enhancements to Akamai Content Protector that stop evasive scraping across web and mobile while minimizing user friction and false positives.</description>
	<link>https://www.akamai.com/blog/security/2026/mar/avoid-evasive-scraping-stronger-content-protection</link>
	<author>Emily Lyons</author>
	<guid>https://www.akamai.com/blog/security/2026/mar/avoid-evasive-scraping-stronger-content-protection</guid>
	<pubDate>Tue, 10 Mar 2026 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Role-Based Access Control (RBAC) Now Available in Akamai Cloud</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2026/mar/role-based-access-control-rbac-akamai-cloud</link>
	<author>George Zhukovsky</author>
	<guid>https://www.akamai.com/blog/cloud/2026/mar/role-based-access-control-rbac-akamai-cloud</guid>
	<pubDate>Mon, 09 Mar 2026 12:00:00 UTC</pubDate>

</item>
<item>
	<title>How Harmonic Proved High-Performance AI Inference on Akamai GPUs</title>
	<description>Find out how Harmonic achieved high-performance AI inference on Akamai Cloud with NVIDIA Blackwell GPUs, optimizing for speed and efficiency.</description>
	<link>https://www.akamai.com/blog/cloud/2026/mar/harmonic-high-performance-ai-inference-akamai-gpus</link>
	<author>Danielle Cook</author>
	<guid>https://www.akamai.com/blog/cloud/2026/mar/harmonic-high-performance-ai-inference-akamai-gpus</guid>
	<pubDate>Thu, 05 Mar 2026 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Why GPU Card Counts Matter for Real AI Workloads</title>
	<description>Stay ahead with NVIDIA RTX PRO™ 6000 Blackwell Server Edition GPUs in the Akamai Inference Cloud. Discover the right GPU shape for your AI needs.</description>
	<link>https://www.akamai.com/blog/cloud/2026/mar/why-gpu-card-counts-matter-real-ai-workloads</link>
	<author> Arshad Khan</author>
	<guid>https://www.akamai.com/blog/cloud/2026/mar/why-gpu-card-counts-matter-real-ai-workloads</guid>
	<pubDate>Tue, 03 Mar 2026 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Choose the Right GPU on Akamai Cloud for Your AI Workload</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2026/mar/choose-right-gpu-akamai-cloud-ai-workload</link>
	<author> Arshad Khan</author>
	<guid>https://www.akamai.com/blog/cloud/2026/mar/choose-right-gpu-akamai-cloud-ai-workload</guid>
	<pubDate>Tue, 03 Mar 2026 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Post-Quantum Cryptography Beyond TLS: Remain Quantum Safe</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2026/mar/post-quantum-cryptography-beyond-tls</link>
	<author>Jan Schaumann</author>
	<guid>https://www.akamai.com/blog/security/2026/mar/post-quantum-cryptography-beyond-tls</guid>
	<pubDate>Mon, 02 Mar 2026 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Zerobot Malware Targets n8n Automation Platform</title>
	<description>The use of Mirai continues. Read how the Akamai SIRT identified active exploitation of vulnerabilities in the n8n automation platform and Tenda AC1206 routers.</description>
	<link>https://www.akamai.com/blog/security-research/2026/feb/zerobot-malware-targets-n8n-automation-platform</link>
	<author>Kyle Lefton</author>
	<guid>https://www.akamai.com/blog/security-research/2026/feb/zerobot-malware-targets-n8n-automation-platform</guid>
	<pubDate>Fri, 27 Feb 2026 19:00:00 UTC</pubDate>

</item>
<item>
	<title>Cleaner Compute: Akamai Adds 128 MW of Renewable Energy to the Grid</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2026/feb/cleaner-compute-akamai-adds-128-mw-renewable-energy-grid</link>
	<author>Margot Hines</author>
	<guid>https://www.akamai.com/blog/sustainability/2026/feb/cleaner-compute-akamai-adds-128-mw-renewable-energy-grid</guid>
	<pubDate>Thu, 26 Feb 2026 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Accelerate Digital Service Delivery in Government Agencies</title>
	<description></description>
	<link>https://www.akamai.com/blog/performance/2026/feb/accelerate-digital-service-delivery-government-agencies</link>
	<author>Joe Henry</author>
	<guid>https://www.akamai.com/blog/performance/2026/feb/accelerate-digital-service-delivery-government-agencies</guid>
	<pubDate>Wed, 25 Feb 2026 17:00:00 UTC</pubDate>

</item>
<item>
	<title>When Uptime Is Non-Negotiable: Rethinking Zero Trust for OT Environments</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2026/feb/uptime-non-negotiable-rethinking-zero-trust-ot-environments</link>
	<author>Clint Huffaker</author>
	<guid>https://www.akamai.com/blog/security/2026/feb/uptime-non-negotiable-rethinking-zero-trust-ot-environments</guid>
	<pubDate>Mon, 23 Feb 2026 15:00:00 UTC</pubDate>

</item>
<item>
	<title>CVE-2026-26365: Incorrect processing of “Connection: Transfer-Encoding” </title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2026/feb/cve-2026-26365-incorrect-processing-connection-transfer-encoding</link>
	<author>Akamai InfoSec</author>
	<guid>https://www.akamai.com/blog/security-research/2026/feb/cve-2026-26365-incorrect-processing-connection-transfer-encoding</guid>
	<pubDate>Fri, 20 Feb 2026 17:00:00 UTC</pubDate>

</item>
<item>
	<title>Inside the Fix: Analysis of In-the-Wild Exploit of CVE-2026-21513</title>
	<description>Read how PatchDiff-AI uncovered the root cause of CVE-2026-21513 — an actively exploited MSHTML vulnerability — and how APT28 leveraged it in real-world attacks.</description>
	<link>https://www.akamai.com/blog/security-research/2026/feb/inside-the-fix-cve-2026-21513-mshtml-exploit-analysis</link>
	<author>Maor Dahan</author>
	<guid>https://www.akamai.com/blog/security-research/2026/feb/inside-the-fix-cve-2026-21513-mshtml-exploit-analysis</guid>
	<pubDate>Fri, 20 Feb 2026 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Adapt, Protect, and Extend: How Partners Can Help Orgs Unlock ROI from AI</title>
	<description></description>
	<link>https://www.akamai.com/blog/partners/2026/feb/adapt-protect-extend-how-partners-help-unlock-roi-ai</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/partners/2026/feb/adapt-protect-extend-how-partners-help-unlock-roi-ai</guid>
	<pubDate>Thu, 19 Feb 2026 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Why Cloud Reliability Depends on Imperfect Software</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2026/feb/part-1-why-cloud-reliability-depends-imperfect-software</link>
	<author>James Kretchmar</author>
	<guid>https://www.akamai.com/blog/cloud/2026/feb/part-1-why-cloud-reliability-depends-imperfect-software</guid>
	<pubDate>Thu, 19 Feb 2026 08:00:00 UTC</pubDate>

</item>
<item>
	<title>Why CEOs' AI Hype Really Isn't Landing with Employees</title>
	<description>Read about the disconnect between CEO enthusiasm for AI and employee perception of its value, and learn how to build communication that moves adoption forward.</description>
	<link>https://www.akamai.com/blog/cloud/2026/feb/why-ceos-ai-hype-really-isnt-landing-employees</link>
	<author>Vineeth Varughese</author>
	<guid>https://www.akamai.com/blog/cloud/2026/feb/why-ceos-ai-hype-really-isnt-landing-employees</guid>
	<pubDate>Wed, 18 Feb 2026 18:00:00 UTC</pubDate>

</item>
<item>
	<title>From Clawdbot to OpenClaw: Practical Lessons in Building Secure Agents</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2026/feb/clawdbot-openclaw-practical-lessons-building-secure-agents</link>
	<author>Maxim Zavodchik &amp; Alon Ganor</author>
	<guid>https://www.akamai.com/blog/security/2026/feb/clawdbot-openclaw-practical-lessons-building-secure-agents</guid>
	<pubDate>Wed, 18 Feb 2026 17:00:00 UTC</pubDate>

</item>
<item>
	<title>Zero Trust Switching: Why Firewalls Alone Can’t Secure AI Workloads</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2026/feb/zero-trust-switching-firewalls-cant-secure-ai-workloads</link>
	<author>Clint Huffaker</author>
	<guid>https://www.akamai.com/blog/security/2026/feb/zero-trust-switching-firewalls-cant-secure-ai-workloads</guid>
	<pubDate>Wed, 18 Feb 2026 13:00:00 UTC</pubDate>

</item>
<item>
	<title>From Super Bowl to World Cup: How Akamai Delivers the Perfect Event</title>
	<description>Learn why Akamai is at the core of the biggest online sporting events, and how we help you be successful in the most critical moments.</description>
	<link>https://www.akamai.com/blog/trends/2026/feb/super-bowl-world-cup-akamai-delivers-perfect-event</link>
	<author>Justin Liu</author>
	<guid>https://www.akamai.com/blog/trends/2026/feb/super-bowl-world-cup-akamai-delivers-perfect-event</guid>
	<pubDate>Tue, 17 Feb 2026 18:00:00 UTC</pubDate>

</item>
<item>
	<title>Understand the Shift Toward AI-Driven Interactions: ​A Guide to MCP</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2026/feb/leaders-guide-mcp-understand-shift-toward-ai-interactions</link>
	<author>Maxim Zavodchik &amp; Boris Kirzner</author>
	<guid>https://www.akamai.com/blog/security/2026/feb/leaders-guide-mcp-understand-shift-toward-ai-interactions</guid>
	<pubDate>Thu, 12 Feb 2026 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Observing the Anatomy of Peak Traffic</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2026/feb/observing-anatomy-peak-traffic</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/cloud/2026/feb/observing-anatomy-peak-traffic</guid>
	<pubDate>Wed, 11 Feb 2026 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Industrialized Ransomware: Confronting the New Reality</title>
	<description>Read about the new ransomware reality and what most security strategies get wrong. Learn how to protect your organization in 2026. </description>
	<link>https://www.akamai.com/blog/security/2026/feb/industrialized-ransomware-confronting-new-reality</link>
	<author>Barney Beal</author>
	<guid>https://www.akamai.com/blog/security/2026/feb/industrialized-ransomware-confronting-new-reality</guid>
	<pubDate>Tue, 10 Feb 2026 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Your OpenClaw Agent Doesn't Sleep. Your Laptop Does. Move It to the Cloud.</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2026/feb/openclaw-agent-doesnt-sleep-laptop-does-move-cloud</link>
	<author>Lena Hall, Shawn Michels &amp; Tarun Chinmai Sekar</author>
	<guid>https://www.akamai.com/blog/developers/2026/feb/openclaw-agent-doesnt-sleep-laptop-does-move-cloud</guid>
	<pubDate>Mon, 09 Feb 2026 08:00:00 UTC</pubDate>

</item>
<item>
	<title>Why Hydrolix Partnered with Akamai to Solve Observability at Scale</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2026/feb/why-hydrolix-partnered-akamai-solve-observability-scale</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/cloud/2026/feb/why-hydrolix-partnered-akamai-solve-observability-scale</guid>
	<pubDate>Wed, 04 Feb 2026 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Named a 2026 Gartner Peer Insights™ Customers’ Choice for Network Security</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2026/jan/akamai-2026-gartner-customers-choice-network-security</link>
	<author>Jacob Abrams</author>
	<guid>https://www.akamai.com/blog/security/2026/jan/akamai-2026-gartner-customers-choice-network-security</guid>
	<pubDate>Wed, 28 Jan 2026 11:00:00 UTC</pubDate>

</item>
<item>
	<title>Enhancements to Akamai API Security, Q4 2025</title>
	<description>The Q4 2025 Akamai API Security updates help organizations shift security left, improve coverage, and reduce friction.</description>
	<link>https://www.akamai.com/blog/security/2026/jan/enhancements-akamai-api-security-q4-2025</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2026/jan/enhancements-akamai-api-security-q4-2025</guid>
	<pubDate>Tue, 27 Jan 2026 14:00:00 UTC</pubDate>

</item>
<item>
	<title>CVE-2026-23864: React and Next.js Denial of Service via Memory Exhaustion</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2026/jan/cve-2026-23864-react-nextjs-denial-of-service</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2026/jan/cve-2026-23864-react-nextjs-denial-of-service</guid>
	<pubDate>Mon, 26 Jan 2026 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Block Storage Makes Block Disk Encryption the Default in Terraform</title>
	<description>Learn about the early 2026 Terraform update, how the change will affect your workflow, and how to successfully navigate any issues that may arise. </description>
	<link>https://www.akamai.com/blog/cloud/2026/jan/akamai-block-storage-disk-encryption-default-terraform</link>
	<author>Jose Malacara &amp; Kong Yang</author>
	<guid>https://www.akamai.com/blog/cloud/2026/jan/akamai-block-storage-disk-encryption-default-terraform</guid>
	<pubDate>Fri, 23 Jan 2026 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Why Asia’s Public Sector Is Rethinking Cyber Resilience</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2026/jan/why-asias-public-sector-is-rethinking-cyber-resilience</link>
	<author>Reuben Koh</author>
	<guid>https://www.akamai.com/blog/security/2026/jan/why-asias-public-sector-is-rethinking-cyber-resilience</guid>
	<pubDate>Thu, 22 Jan 2026 18:00:00 UTC</pubDate>

</item>
<item>
	<title>Valkey: The Future of Open Source In-Memory Data Stores</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2026/jan/valkey-future-open-source-memory-data-stores</link>
	<author>Amit Mohanty</author>
	<guid>https://www.akamai.com/blog/cloud/2026/jan/valkey-future-open-source-memory-data-stores</guid>
	<pubDate>Wed, 21 Jan 2026 18:00:00 UTC</pubDate>

</item>
<item>
	<title>Your New Marketing Assistant: The AI Expert in Akamai Campaign Builder</title>
	<description>The AI Expert in Akamai Campaign Builder is now available to help you plan, build, and launch smarter campaigns — faster.</description>
	<link>https://www.akamai.com/blog/partners/2026/jan/marketing-assistant-ai-expert-akamai-campaign-builder</link>
	<author>Gabriela Grigoras</author>
	<guid>https://www.akamai.com/blog/partners/2026/jan/marketing-assistant-ai-expert-akamai-campaign-builder</guid>
	<pubDate>Tue, 20 Jan 2026 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Command Injection in Vivotek Legacy Firmware: What You Need to Know</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2026/jan/command-injection-vivotek-legacy-firmware-need-to-know</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security-research/2026/jan/command-injection-vivotek-legacy-firmware-need-to-know</guid>
	<pubDate>Tue, 20 Jan 2026 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Dangling DNS: The Most Overlooked Attack Surface in the AI Era</title>
	<description>Closing DNS gaps is crucial for securing your AI agents. Discover how Akamai DNS Posture Management detects dangling DNS and helps stop overlooked threats.</description>
	<link>https://www.akamai.com/blog/security/2026/jan/dangling-dns-most-overlooked-attack-surface-ai-era</link>
	<author>Venkatesh Bachu</author>
	<guid>https://www.akamai.com/blog/security/2026/jan/dangling-dns-most-overlooked-attack-surface-ai-era</guid>
	<pubDate>Fri, 16 Jan 2026 14:00:00 UTC</pubDate>

</item>
<item>
	<title>East-West Is the New North-South: Rethink Security for the AI-Driven Data Center</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2026/jan/east-west-north-south-rethink-security-ai-driven-data-center</link>
	<author>Clint Huffaker</author>
	<guid>https://www.akamai.com/blog/security/2026/jan/east-west-north-south-rethink-security-ai-driven-data-center</guid>
	<pubDate>Thu, 15 Jan 2026 07:00:00 UTC</pubDate>

</item>
<item>
	<title>AI Pulse: How AI Bots and Agents Will Shape 2026</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2026/jan/ai-pulse-how-ai-bots-agents-will-shape-2026</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/2026/jan/ai-pulse-how-ai-bots-agents-will-shape-2026</guid>
	<pubDate>Mon, 12 Jan 2026 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Why VM Shapes Matter: New Compute Plans Deliver Predictable Performance</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2026/jan/vm-shapes-matter-new-compute-plans-predictable-performance</link>
	<author>Sarah Walter</author>
	<guid>https://www.akamai.com/blog/cloud/2026/jan/vm-shapes-matter-new-compute-plans-predictable-performance</guid>
	<pubDate>Fri, 09 Jan 2026 13:00:00 UTC</pubDate>

</item>
<item>
	<title>CVE-2025-14847: All You Need to Know About MongoBleed</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/dec/cve-2025-14847-all-you-need-to-know-about-mongobleed</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2025/dec/cve-2025-14847-all-you-need-to-know-about-mongobleed</guid>
	<pubDate>Tue, 30 Dec 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>I Built a RAG Bot to Decode Airline Bureaucracy (So You Don't Have To)</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/dec/built-rag-bot-decode-airline-bureaucracy</link>
	<author>Lena Hall</author>
	<guid>https://www.akamai.com/blog/developers/2025/dec/built-rag-bot-decode-airline-bureaucracy</guid>
	<pubDate>Fri, 19 Dec 2025 17:00:00 UTC</pubDate>

</item>
<item>
	<title>AI Actor Tilly Norwood and the Impact of Cloud Infrastructure</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/dec/ai-actor-tilly-norwood-impact-cloud-infrastructure</link>
	<author>Vineeth Varughese</author>
	<guid>https://www.akamai.com/blog/cloud/2025/dec/ai-actor-tilly-norwood-impact-cloud-infrastructure</guid>
	<pubDate>Fri, 19 Dec 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Cloud: New G8 Dedicated Hardware and Performance VM Shapes</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/dec/akamai-cloud-g8-dedicated-hardware-5th-gen-amd-epyc</link>
	<author>Sarah Walter</author>
	<guid>https://www.akamai.com/blog/cloud/2025/dec/akamai-cloud-g8-dedicated-hardware-5th-gen-amd-epyc</guid>
	<pubDate>Wed, 17 Dec 2025 17:00:00 UTC</pubDate>

</item>
<item>
	<title>Peak Season Isn’t a Season. It’s the World You Operate In.</title>
	<description>Peak season isn’t seasonal anymore. Learn why modern surges stem from security risks, not traffic, and how Akamai keeps businesses resilient every day.</description>
	<link>https://www.akamai.com/blog/security/2025/dec/peak-season-is-world-you-operate-in</link>
	<author>Cheryl Chiodi</author>
	<guid>https://www.akamai.com/blog/security/2025/dec/peak-season-is-world-you-operate-in</guid>
	<pubDate>Wed, 17 Dec 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>AI Pulse: How AI Bots Surface Your Content</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/dec/ai-pulse-how-ai-bots-surface-your-content</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/2025/dec/ai-pulse-how-ai-bots-surface-your-content</guid>
	<pubDate>Tue, 16 Dec 2025 17:00:00 UTC</pubDate>

</item>
<item>
	<title>Beyond the Buzz: Why Zero Trust Matters More in the Age of AI</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/dec/beyond-buzz-why-zero-trust-matters-more-age-ai</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/2025/dec/beyond-buzz-why-zero-trust-matters-more-age-ai</guid>
	<pubDate>Tue, 16 Dec 2025 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Stop Overpaying for East-West Traffic Control: Firewalls vs. Security Groups</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/dec/stop-overpaying-east-west-traffic-control-firewalls-security</link>
	<author>Yoni Nabedrik, Daniel Itzhak &amp; Srinivas Chivukula</author>
	<guid>https://www.akamai.com/blog/security/2025/dec/stop-overpaying-east-west-traffic-control-firewalls-security</guid>
	<pubDate>Fri, 12 Dec 2025 17:00:00 UTC</pubDate>

</item>
<item>
	<title>CVE-2025-66516: Detecting and Defending Against Apache Tika XXE Attack</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/dec/cve-2025-66516-detecting-defending-apache-tika-xxe-attack</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2025/dec/cve-2025-66516-detecting-defending-apache-tika-xxe-attack</guid>
	<pubDate>Fri, 12 Dec 2025 07:00:00 UTC</pubDate>

</item>
<item>
	<title>How Akamai Is Powering Trust in Tomorrow’s AI-Driven Ecosystem</title>
	<description>Discover how Akamai powers secure, trusted AI interactions by verifying bots and agents, enabling adaptive trust, and supporting new monetization opportunities.</description>
	<link>https://www.akamai.com/blog/security/2025/dec/akamai-powering-trust-tomorrows-ai-driven-ecosystem</link>
	<author>Tsvika Klein</author>
	<guid>https://www.akamai.com/blog/security/2025/dec/akamai-powering-trust-tomorrows-ai-driven-ecosystem</guid>
	<pubDate>Thu, 11 Dec 2025 18:00:00 UTC</pubDate>

</item>
<item>
	<title>The Year in Review 2025: AI, APIs, and a Whole Lot of Audacity</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/dec/year-review-2025-ai-apis-audacity</link>
	<author>Kimberly Gomez</author>
	<guid>https://www.akamai.com/blog/security/2025/dec/year-review-2025-ai-apis-audacity</guid>
	<pubDate>Thu, 11 Dec 2025 11:00:00 UTC</pubDate>

</item>
<item>
	<title>CVE-2025-55183 and CVE-2025-55184: Mitigating React/Next.js Vulnerabilities</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/dec/cve-2025-55183-55184-mitigating-reactnextjs-vulnerabilities</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2025/dec/cve-2025-55183-55184-mitigating-reactnextjs-vulnerabilities</guid>
	<pubDate>Thu, 11 Dec 2025 08:00:00 UTC</pubDate>

</item>
<item>
	<title>Patch Wednesday: Root Cause Analysis with LLMs</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/dec/patch-wednesday-root-cause-analysis-with-llms</link>
	<author>Maor Dahan</author>
	<guid>https://www.akamai.com/blog/security-research/2025/dec/patch-wednesday-root-cause-analysis-with-llms</guid>
	<pubDate>Wed, 10 Dec 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>CVE-2025-53841: Guardicore Local Privilege Escalation Vulnerability</title>
	<description>Get technical details about a security vulnerability (CVE-2025-53841) in Akamai's Guardicore Platform Agent for Windows and clear guidance on mitigation.</description>
	<link>https://www.akamai.com/blog/security/2025/dec/advisory-cve-2025-53841-guardicore-local-privilege-escalation</link>
	<author>Akamai InfoSec</author>
	<guid>https://www.akamai.com/blog/security/2025/dec/advisory-cve-2025-53841-guardicore-local-privilege-escalation</guid>
	<pubDate>Tue, 09 Dec 2025 10:00:00 UTC</pubDate>

</item>
<item>
	<title>AI Pulse: The First Agentic Cyber Week</title>
	<description>In 2025, AI bots officially entered Cyber Week. Learn how agents shaped traffic and shopper intent — and why retailers must optimize for AI-driven commerce.</description>
	<link>https://www.akamai.com/blog/security/2025/dec/ai-pulse-first-agentic-cyber-week</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/2025/dec/ai-pulse-first-agentic-cyber-week</guid>
	<pubDate>Mon, 08 Dec 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Inside the Fix: AI-Powered Root Cause Analysis of CVE-2025-60719</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/dec/inside-fix-ai-root-cause-analysis-cve-2025-60719</link>
	<author>Maor Dahan</author>
	<guid>https://www.akamai.com/blog/security-research/2025/dec/inside-fix-ai-root-cause-analysis-cve-2025-60719</guid>
	<pubDate>Mon, 08 Dec 2025 07:00:00 UTC</pubDate>

</item>
<item>
	<title>MSL5 General Availability and MSL4 Product Retirement</title>
	<description>Akamai Media Services Live 4 will be discontinued on December 31, 2026. The upgraded Akamai Media Services Live 5 is currently in general availability.</description>
	<link>https://www.akamai.com/blog/edge/2025/dec/msl5-general-availability-msl4-product-retirement</link>
	<author>Ansley Flanagan</author>
	<guid>https://www.akamai.com/blog/edge/2025/dec/msl5-general-availability-msl4-product-retirement</guid>
	<pubDate>Fri, 05 Dec 2025 23:00:00 UTC</pubDate>

</item>
<item>
	<title>Demonstrating Resilience and Scale on Black Friday and Cyber Monday</title>
	<description>Akamai proved its resilience and scale by handling an 80% increase in traffic during the busiest shopping time of the year: Black Friday and Cyber Monday.</description>
	<link>https://www.akamai.com/blog/security/2025/dec/resilience-scale-black-friday-cyber-monday</link>
	<author>Berk Veral</author>
	<guid>https://www.akamai.com/blog/security/2025/dec/resilience-scale-black-friday-cyber-monday</guid>
	<pubDate>Fri, 05 Dec 2025 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Reliability Isn't a Feature. It's a Commitment.</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/dec/reliability-isnt-a-feature-its-a-commitment</link>
	<author>Adam Karon</author>
	<guid>https://www.akamai.com/blog/cloud/2025/dec/reliability-isnt-a-feature-its-a-commitment</guid>
	<pubDate>Fri, 05 Dec 2025 09:00:00 UTC</pubDate>

</item>
<item>
	<title>DNS Visibility Gap: Misconfigurations That Firewalls Miss in Network Security</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/dec/dns-misconfigurations-firewalls-miss-network-security</link>
	<author>Ramita Singh</author>
	<guid>https://www.akamai.com/blog/security/2025/dec/dns-misconfigurations-firewalls-miss-network-security</guid>
	<pubDate>Thu, 04 Dec 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Advancing Innovation at the Akamai Greater China Partner Summit 2025</title>
	<description></description>
	<link>https://www.akamai.com/blog/partners/2025/dec/akamai-greater-china-partner-summit-2025</link>
	<author>Fiona Zhang</author>
	<guid>https://www.akamai.com/blog/partners/2025/dec/akamai-greater-china-partner-summit-2025</guid>
	<pubDate>Thu, 04 Dec 2025 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Lessons from Smart Switching: Rethinking Security and Performance</title>
	<description>Microsegmentation built directly into the network infrastructure means that stronger network security no longer equals slower systems.</description>
	<link>https://www.akamai.com/blog/security/2025/dec/lessons-smart-switching-rethinking-security-performance</link>
	<author>Clint Huffaker</author>
	<guid>https://www.akamai.com/blog/security/2025/dec/lessons-smart-switching-rethinking-security-performance</guid>
	<pubDate>Wed, 03 Dec 2025 20:00:00 UTC</pubDate>

</item>
<item>
	<title>Digital Signatures: Traditional Vs. Post-Quantum Cryptographic Mechanisms</title>
	<description>Secure your connections against quantum threats. Learn about post-quantum cryptography and digital signatures.</description>
	<link>https://www.akamai.com/blog/security/2025/dec/digital-signatures-traditional-post-quantum-cryptographic</link>
	<author> Rich Salz</author>
	<guid>https://www.akamai.com/blog/security/2025/dec/digital-signatures-traditional-post-quantum-cryptographic</guid>
	<pubDate>Wed, 03 Dec 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>CVE-2025-55182: React and Next.js Server Functions Deserialization RCE</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/dec/cve-2025-55182-react-nextjs-server-functions-deserialization-rce</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2025/dec/cve-2025-55182-react-nextjs-server-functions-deserialization-rce</guid>
	<pubDate>Wed, 03 Dec 2025 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Empower CISOs with Visibility, Agility, Compliance, and Strategic ROI</title>
	<description>Learn how Akamai Prolexic Network Cloud Firewall allows CISOs to manage risk, resilience, and reputation by delivering visibility, agility, and proactive defense.</description>
	<link>https://www.akamai.com/blog/security/2025/dec/empower-cisos-visibility-agility-compliance-strategic-roi</link>
	<author>Nitin Singla, Sandeep Rath &amp; Ankita Kharya</author>
	<guid>https://www.akamai.com/blog/security/2025/dec/empower-cisos-visibility-agility-compliance-strategic-roi</guid>
	<pubDate>Tue, 02 Dec 2025 15:00:00 UTC</pubDate>

</item>
<item>
	<title>CVE-2025-66373: HTTP Request Smuggling Due to Invalid Chunked Body Size</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/dec/cve-2025-66373-http-request-smuggling-chunked-body-size</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/security/2025/dec/cve-2025-66373-http-request-smuggling-chunked-body-size</guid>
	<pubDate>Tue, 02 Dec 2025 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Building Distributed Apps? Akamai and Fermyon Are Changing the Game.</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/nov/building-distributed-apps-akamai-fermyon-changing-game</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/cloud/2025/nov/building-distributed-apps-akamai-fermyon-changing-game</guid>
	<pubDate>Mon, 01 Dec 2025 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Defend Post-Quantum Cryptography's “Harvest Now, Decrypt Later” with WAAP</title>
	<description>Prepare for a quantum-safe future. Learn how Akamai App &amp; API Protector helps stop the data leaks that fuel “harvest now, decrypt later” attacks.</description>
	<link>https://www.akamai.com/blog/security/2025/nov/defend-post-quantum-harvest-now-decrypt-later-waap</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/2025/nov/defend-post-quantum-harvest-now-decrypt-later-waap</guid>
	<pubDate>Mon, 01 Dec 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Full Circle: How Akamai’s Evolution Set the Stage for the AI Inference Era</title>
	<description>Read how Akamai, a pioneer in CDNs, is undergoing a profound strategic transformation into a diversified cloud and cybersecurity provider in the AI era.</description>
	<link>https://www.akamai.com/blog/cloud/2025/nov/full-circle-akamais-evolution-set-stage-ai-inference-era</link>
	<author>Mike Maney</author>
	<guid>https://www.akamai.com/blog/cloud/2025/nov/full-circle-akamais-evolution-set-stage-ai-inference-era</guid>
	<pubDate>Wed, 26 Nov 2025 20:00:00 UTC</pubDate>

</item>
<item>
	<title>Belonging at Akamai: My Journey of Inclusion, Growth, and Connection</title>
	<description>Discover how Akamai’s culture of belonging and inclusion empowers employees and drives innovation in tech.</description>
	<link>https://www.akamai.com/blog/culture/2025/nov/belonging-akamai-journey-inclusion-growth-connection</link>
	<author>Ramita Singh</author>
	<guid>https://www.akamai.com/blog/culture/2025/nov/belonging-akamai-journey-inclusion-growth-connection</guid>
	<pubDate>Wed, 26 Nov 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Beyond NSX: A Strategic Alternative for VMware Customers</title>
	<description>Broadcom’s VMware acquisition has driven up costs and complexity. Akamai Guardicore Segmentation offers a modern, secure, and cost-efficient path beyond NSX.</description>
	<link>https://www.akamai.com/blog/security/2025/nov/beyond-nsx-strategic-alternative-vmware-customers</link>
	<author>Jacob Abrams</author>
	<guid>https://www.akamai.com/blog/security/2025/nov/beyond-nsx-strategic-alternative-vmware-customers</guid>
	<pubDate>Tue, 25 Nov 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Scam Alert: Impersonation of Akamai on Telegram</title>
	<description>Learn about a persisting scam on Telegram that involves scammers who are pretending to be from Akamai and requesting money.</description>
	<link>https://www.akamai.com/blog/news/2025/nov/scam-alert-impersonation-akamai-telegram</link>
	<author>Akamai InfoSec</author>
	<guid>https://www.akamai.com/blog/news/2025/nov/scam-alert-impersonation-akamai-telegram</guid>
	<pubDate>Tue, 25 Nov 2025 00:15:00 UTC</pubDate>

</item>
<item>
	<title>Aggregated Rate Limiting Defends Against Large-Scale and DDoS Attacks</title>
	<description>Discover how Akamai’s new aggregated rate limiting strengthens defenses against large-scale, distributed DDoS attacks, and API abuse with smarter detection.</description>
	<link>https://www.akamai.com/blog/security/2025/nov/aggregated-rate-limiting-defends-large-scale-ddos</link>
	<author>Irina McDougall</author>
	<guid>https://www.akamai.com/blog/security/2025/nov/aggregated-rate-limiting-defends-large-scale-ddos</guid>
	<pubDate>Mon, 24 Nov 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>AI Pulse: How OpenAI Became the Majority Player</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/nov/how-openai-became-the-majority-player</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/2025/nov/how-openai-became-the-majority-player</guid>
	<pubDate>Mon, 24 Nov 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Distributed Edge Inference Changes Everything</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/nov/distributed-edge-inference-changes-everything</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/cloud/2025/nov/distributed-edge-inference-changes-everything</guid>
	<pubDate>Fri, 21 Nov 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>A Pre-Built CNCF Pipeline: From Git to Running on Kubernetes</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/nov/pre-built-cncf-pipeline-git-running-on-kubernetes</link>
	<author>Prasoon Pushkar</author>
	<guid>https://www.akamai.com/blog/cloud/2025/nov/pre-built-cncf-pipeline-git-running-on-kubernetes</guid>
	<pubDate>Fri, 21 Nov 2025 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Bot Management for the Agentic Era</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/nov/bot-management-agentic-era</link>
	<author>David Sénécal</author>
	<guid>https://www.akamai.com/blog/security/2025/nov/bot-management-agentic-era</guid>
	<pubDate>Thu, 20 Nov 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Firmwhere? Rediscovering a Vulnerability in Vivotek Legacy Firmware</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/nov/rce-zero-day-in-legacy-vivotek-firmware</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security-research/2025/nov/rce-zero-day-in-legacy-vivotek-firmware</guid>
	<pubDate>Thu, 20 Nov 2025 07:00:00 UTC</pubDate>

</item>
<item>
	<title>A CMO’s Perspective: Why This Moment Matters in the AI Era</title>
	<description>Akamai’s CMO describes how the company is radically rethinking and extending the systems needed to unlock AI's true potential.</description>
	<link>https://www.akamai.com/blog/cloud/2025/nov/cmos-perspective-why-moment-matters-ai-era</link>
	<author>Kim Salem-Jackson</author>
	<guid>https://www.akamai.com/blog/cloud/2025/nov/cmos-perspective-why-moment-matters-ai-era</guid>
	<pubDate>Wed, 19 Nov 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>When the Internet Fails Again, Will You Survive a DDoS Attack?</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/nov/when-internet-fails-again-survive-a-ddos-attack</link>
	<author>Sven Dummer, Sandeep Rath &amp; Ankita Kharya</author>
	<guid>https://www.akamai.com/blog/security/2025/nov/when-internet-fails-again-survive-a-ddos-attack</guid>
	<pubDate>Wed, 19 Nov 2025 11:00:00 UTC</pubDate>

</item>
<item>
	<title>What We Do In The Shadow (AI): New Malware Strain Vamps Up</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/nov/new-malware-chat-completions-llm-shadow-ai</link>
	<author>Yonatan Gilvarg</author>
	<guid>https://www.akamai.com/blog/security-research/2025/nov/new-malware-chat-completions-llm-shadow-ai</guid>
	<pubDate>Tue, 18 Nov 2025 07:00:00 UTC</pubDate>

</item>
<item>
	<title>AI Pulse: The Rise of AI Search Crawlers</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/nov/ai-pulse-rise-ai-search-crawlers</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/2025/nov/ai-pulse-rise-ai-search-crawlers</guid>
	<pubDate>Mon, 17 Nov 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Zero Trust Security for Mission Partner Environments in Coalition Operations</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/nov/zero-trust-mission-partner-coalition-operations</link>
	<author>Mike Colson &amp; Jason Turse</author>
	<guid>https://www.akamai.com/blog/security/2025/nov/zero-trust-mission-partner-coalition-operations</guid>
	<pubDate>Fri, 14 Nov 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Future-Proofing Retail Security: Preparing for Tomorrow's Cyberthreats</title>
	<description>Learn about the emerging cybersecurity threats facing retailers and the advanced technologies needed to build adaptive, future-ready security defenses.</description>
	<link>https://www.akamai.com/blog/security/2025/nov/future-proofing-retail-security-preparing-tomorrows-cyberthreats</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/2025/nov/future-proofing-retail-security-preparing-tomorrows-cyberthreats</guid>
	<pubDate>Wed, 12 Nov 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Redefine Trust with Web Bot Authentication</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/nov/redefine-trust-web-bot-authentication</link>
	<author>Rupesh Chokshi</author>
	<guid>https://www.akamai.com/blog/security/2025/nov/redefine-trust-web-bot-authentication</guid>
	<pubDate>Mon, 10 Nov 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>AI Pulse: AI Bots Are Targeting Commerce, Publishers, and High Tech</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/nov/ai-pulse-ai-bots-commerce-publishers-high-tech</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/2025/nov/ai-pulse-ai-bots-commerce-publishers-high-tech</guid>
	<pubDate>Mon, 10 Nov 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Protect Personal Data in Today’s API Economy</title>
	<description></description>
	<link>https://www.akamai.com/blog/partners/2025/nov/how-to-protect-personal-data-todays-api-economy</link>
	<author>Maegan Reid &amp; Patrick McNeil</author>
	<guid>https://www.akamai.com/blog/partners/2025/nov/how-to-protect-personal-data-todays-api-economy</guid>
	<pubDate>Fri, 07 Nov 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>AI Explainer: What Is Model Context Protocol?</title>
	<description></description>
	<link>https://www.akamai.com/blog/trends/2025/nov/ai-explainer-what-is-model-context-protocol</link>
	<author>Michael Merideth</author>
	<guid>https://www.akamai.com/blog/trends/2025/nov/ai-explainer-what-is-model-context-protocol</guid>
	<pubDate>Thu, 06 Nov 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Internet Connectivity Issues in Russia</title>
	<description></description>
	<link>https://www.akamai.com/blog/edge/2025/nov/internet-connectivity-issues-in-russia</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/edge/2025/nov/internet-connectivity-issues-in-russia</guid>
	<pubDate>Thu, 06 Nov 2025 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Online Fraud and Abuse 2025: AI Is in the Driver’s Seat</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/nov/online-fraud-abuse-2025-ai-drivers-seat</link>
	<author>Kimberly Gomez</author>
	<guid>https://www.akamai.com/blog/security-research/2025/nov/online-fraud-abuse-2025-ai-drivers-seat</guid>
	<pubDate>Tue, 04 Nov 2025 11:00:00 UTC</pubDate>

</item>
<item>
	<title>AI Pulse: How Big Tech Impacts AI Bot Traffic</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/nov/ai-pulse-big-tech-impacts-ai-bot-traffic</link>
	<author>Rob Lester</author>
	<guid>https://www.akamai.com/blog/security/2025/nov/ai-pulse-big-tech-impacts-ai-bot-traffic</guid>
	<pubDate>Mon, 03 Nov 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Discover the 3 Stages of Cloud Maturity by Taking Our Quiz</title>
	<description> Discover the three stages of the cloud maturity model and learn how cloud adoption, strategy, and security drive digital transformation.</description>
	<link>https://www.akamai.com/blog/cloud/2025/oct/three-stages-of-cloud-maturity-quiz</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/cloud/2025/oct/three-stages-of-cloud-maturity-quiz</guid>
	<pubDate>Thu, 30 Oct 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Benchmarking NVIDIA RTX Pro 6000 Blackwell on Akamai Cloud</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/oct/benchmarking-nvidia-rtx-pro-6000-blackwell-akamai-cloud</link>
	<author>Mo Tabares &amp; Christiaan Lutzer</author>
	<guid>https://www.akamai.com/blog/cloud/2025/oct/benchmarking-nvidia-rtx-pro-6000-blackwell-akamai-cloud</guid>
	<pubDate>Thu, 30 Oct 2025 08:00:00 UTC</pubDate>

</item>
<item>
	<title>The State of Agentic AI: Disrupting Publishing and Reshaping Ecommerce</title>
	<description>Learn how agentic AI is transforming how users and automation interact with the web — changing how people shop, search, and consume content.</description>
	<link>https://www.akamai.com/blog/security/2025/oct/state-of-agentic-ai-disrupting-publishing-reshaping-ecommerce</link>
	<author>David Sénécal</author>
	<guid>https://www.akamai.com/blog/security/2025/oct/state-of-agentic-ai-disrupting-publishing-reshaping-ecommerce</guid>
	<pubDate>Wed, 29 Oct 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Build AI Agents with Spin and the OpenAI Agents SDK</title>
	<description> </description>
	<link>https://www.akamai.com/blog/developers/2025/oct/agents-with-openai-agents-sdk</link>
	<author>Thorsten Hans</author>
	<guid>https://www.akamai.com/blog/developers/2025/oct/agents-with-openai-agents-sdk</guid>
	<pubDate>Tue, 28 Oct 2025 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Enabling AI Everywhere with Akamai Inference Cloud</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/oct/enabling-ai-everywhere-with-akamai-inference-cloud</link>
	<author>Adam Karon</author>
	<guid>https://www.akamai.com/blog/cloud/2025/oct/enabling-ai-everywhere-with-akamai-inference-cloud</guid>
	<pubDate>Tue, 28 Oct 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>AI: Edge Is All You Need</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/oct/ai-edge-all-you-need</link>
	<author>Jon Alexander</author>
	<guid>https://www.akamai.com/blog/cloud/2025/oct/ai-edge-all-you-need</guid>
	<pubDate>Tue, 28 Oct 2025 05:00:00 UTC</pubDate>

</item>
<item>
	<title>AI Pulse: What Circadian Rhythms Reveal About AI Bot Behavior</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/oct/ai-pulse-circadian-rhythms-reveal-ai-bot-behavior</link>
	<author>Rob Lester</author>
	<guid>https://www.akamai.com/blog/security/2025/oct/ai-pulse-circadian-rhythms-reveal-ai-bot-behavior</guid>
	<pubDate>Mon, 27 Oct 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>When the Cloud Breaks: Lessons from the AWS Outage</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/oct/when-cloud-breaks-lessons-aws-outage</link>
	<author>Sandra Murphy</author>
	<guid>https://www.akamai.com/blog/security/2025/oct/when-cloud-breaks-lessons-aws-outage</guid>
	<pubDate>Mon, 27 Oct 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>The Grim SessionReaper (CVE-2025-54236) Comes to Collect for Halloween</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/oct/grim-sessionreaper-cve-2025-54236-comes-collect-halloween</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2025/oct/grim-sessionreaper-cve-2025-54236-comes-collect-halloween</guid>
	<pubDate>Mon, 27 Oct 2025 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Enhancements to Akamai API Security, Q3 2025</title>
	<description>The recent Akamai API Security updates improve visibility, automation, coverage, and compliance across the API lifecycle.</description>
	<link>https://www.akamai.com/blog/security/2025/oct/enhancements-akamai-api-security-q3-2025</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2025/oct/enhancements-akamai-api-security-q3-2025</guid>
	<pubDate>Thu, 23 Oct 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Unlocking Hidden Value: How AI Transforms Media Archives into Revenue Engines</title>
	<description></description>
	<link>https://www.akamai.com/blog/partners/2025/oct/hidden-value-ai-transforms-media-archives-revenue-engines</link>
	<author>Ira Dworkin &amp; Joseph Glover</author>
	<guid>https://www.akamai.com/blog/partners/2025/oct/hidden-value-ai-transforms-media-archives-revenue-engines</guid>
	<pubDate>Thu, 23 Oct 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Navigating the Next Chapter in Corporate Renewable Energy</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2025/oct/navigating-next-chapter-corporate-renewable-energy</link>
	<author>Margot Hines</author>
	<guid>https://www.akamai.com/blog/sustainability/2025/oct/navigating-next-chapter-corporate-renewable-energy</guid>
	<pubDate>Wed, 22 Oct 2025 16:00:00 UTC</pubDate>

</item>
<item>
	<title>AI Pulse: AI Bot Mitigation Is Increasing Everywhere</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/oct/ai-pulse-bot-mitigation-is-increasing-everywhere</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/2025/oct/ai-pulse-bot-mitigation-is-increasing-everywhere</guid>
	<pubDate>Mon, 20 Oct 2025 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Learning from the LockBit Takedown</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/feb/learning-from-the-lockbit-takedown</link>
	<author>Dean Houari</author>
	<guid>https://www.akamai.com/blog/security/2024/feb/learning-from-the-lockbit-takedown</guid>
	<pubDate>Thu, 16 Oct 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>The Differences Between API Gateway and WAAP — and Why You Need Both</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/jun/difference-between-api-gateway-waap-why-you-need-both</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/2024/jun/difference-between-api-gateway-waap-why-you-need-both</guid>
	<pubDate>Thu, 16 Oct 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Get Started with NVIDIA cuOpt</title>
	<description> A simple guide to get started with cuOpt, an open source, GPU-accelerated solver for decision optimization.</description>
	<link>https://www.akamai.com/blog/cloud/2025/oct/how-to-get-started-nvidia-cuopt</link>
	<author>Atalay Kutlay</author>
	<guid>https://www.akamai.com/blog/cloud/2025/oct/how-to-get-started-nvidia-cuopt</guid>
	<pubDate>Thu, 16 Oct 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Automate Your Security Posture for the 47-Day Certificate Era</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/oct/how-to-automate-and-strengthen-your-security-posture</link>
	<author> Brian Fahey</author>
	<guid>https://www.akamai.com/blog/cloud/2025/oct/how-to-automate-and-strengthen-your-security-posture</guid>
	<pubDate>Thu, 16 Oct 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Protect Hype Events: Bot-Proof Launches with Akamai and Queue-it</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/oct/protect-hype-events-bot-proof-launches-akamai-queue-it</link>
	<author>Emily Lyons</author>
	<guid>https://www.akamai.com/blog/security/2025/oct/protect-hype-events-bot-proof-launches-akamai-queue-it</guid>
	<pubDate>Thu, 16 Oct 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Prevent Command Injection and SQL Injection Attacks over MCP</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/oct/prevent-command-injection-and-sqli-attacks-over-mcp</link>
	<author>Noam Atias &amp; Maxim Zavodchik</author>
	<guid>https://www.akamai.com/blog/security/2025/oct/prevent-command-injection-and-sqli-attacks-over-mcp</guid>
	<pubDate>Wed, 15 Oct 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>AI Pulse: OpenAI’s Wild Bot Behavior After GPT-5</title>
	<description>The AI Pulse series breaks down traffic trends and what they mean for apps, APIs, and businesses. In this post, read how OpenAI’s bots are changing after GPT-5.</description>
	<link>https://www.akamai.com/blog/security/2025/oct/ai-pulse-openai-wild-bot-behavior-after-gpt5</link>
	<author>Rob Lester</author>
	<guid>https://www.akamai.com/blog/security/2025/oct/ai-pulse-openai-wild-bot-behavior-after-gpt5</guid>
	<pubDate>Fri, 10 Oct 2025 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Linode Kubernetes Engine Optimization: Save on Compute, Storage, and Networking</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/oct/linode-kubernetes-engine-optimization</link>
	<author>Prasoon Pushkar</author>
	<guid>https://www.akamai.com/blog/cloud/2025/oct/linode-kubernetes-engine-optimization</guid>
	<pubDate>Thu, 09 Oct 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Named a Gartner Peer Insights Customers’ Choice for WAAP Six Years in a Row</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/oct/akamai-gartner-customers-choice-waap-2025</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/2025/oct/akamai-gartner-customers-choice-waap-2025</guid>
	<pubDate>Wed, 08 Oct 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>A Guide to International Post-Quantum Cryptography Standards</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/oct/guide-international-post-quantum-cryptography-standards</link>
	<author>Jan Schaumann</author>
	<guid>https://www.akamai.com/blog/security/2025/oct/guide-international-post-quantum-cryptography-standards</guid>
	<pubDate>Wed, 08 Oct 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>AI Inference Hardware Decisions: When to Choose CPUs vs. GPUs</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/oct/ai-inference-hardware-decisions</link>
	<author>Joseph Glover</author>
	<guid>https://www.akamai.com/blog/cloud/2025/oct/ai-inference-hardware-decisions</guid>
	<pubDate>Tue, 07 Oct 2025 16:00:00 UTC</pubDate>

</item>
<item>
	<title>Identity-Centric Security: ICAM as a Mission Advantage</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/oct/identity-centric-security-transform-icam-advantage</link>
	<author>Jacob Abrams &amp; Jim Black</author>
	<guid>https://www.akamai.com/blog/security/2025/oct/identity-centric-security-transform-icam-advantage</guid>
	<pubDate>Fri, 03 Oct 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>DNS Hijacking 101: How It Happens and What You Can Do to Prevent It</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/oct/dns-hijacking-101-how-it-happens-what-do-prevent-it</link>
	<author>Sam Preston</author>
	<guid>https://www.akamai.com/blog/security/2025/oct/dns-hijacking-101-how-it-happens-what-do-prevent-it</guid>
	<pubDate>Wed, 01 Oct 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>The Power of Data Observability: Your Edge in a Fast-Changing World</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/sep/power-data-observability-edge-fast-changing-world</link>
	<author>Andy d'Andilly</author>
	<guid>https://www.akamai.com/blog/cloud/2025/sep/power-data-observability-edge-fast-changing-world</guid>
	<pubDate>Tue, 30 Sep 2025 16:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Secure Enterprise Networks by Identifying Malicious IP Addresses</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/sep/secure-enterprise-networks-identify-malicious-ip-addresses</link>
	<author>Ido Sakazi  &amp; Yonatan Gilvarg</author>
	<guid>https://www.akamai.com/blog/security-research/2025/sep/secure-enterprise-networks-identify-malicious-ip-addresses</guid>
	<pubDate>Tue, 30 Sep 2025 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Conversations and the Media Climate Accord at IBC2025</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2025/sep/conversations-media-climate-accord-ibc2025</link>
	<author>Mike Mattera</author>
	<guid>https://www.akamai.com/blog/sustainability/2025/sep/conversations-media-climate-accord-ibc2025</guid>
	<pubDate>Tue, 30 Sep 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>The State of Enterprise AI: Why Edge Native Is the Fastest Path to ROI</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/sep/state-enterprise-ai-why-edge-native-fastest-path-roi</link>
	<author>Hana Jeddy</author>
	<guid>https://www.akamai.com/blog/cloud/2025/sep/state-enterprise-ai-why-edge-native-fastest-path-roi</guid>
	<pubDate>Tue, 30 Sep 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Isolate Your Database: VPC for Managed Databases Is Available Now</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/sep/isolate-database-vpc-managed-databases-available-now</link>
	<author>Prasoon Pushkar</author>
	<guid>https://www.akamai.com/blog/cloud/2025/sep/isolate-database-vpc-managed-databases-available-now</guid>
	<pubDate>Mon, 29 Sep 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>What 400 Executives Reveal About the Future of AI Adoption</title>
	<description>Learn how a Forrester study discovered that most companies are already using AI for competitive differentiation, personalization, and customer retention.</description>
	<link>https://www.akamai.com/blog/cloud/2025/sep/what-400-executives-reveal-future-ai-adoption</link>
	<author>Vineeth Varughese</author>
	<guid>https://www.akamai.com/blog/cloud/2025/sep/what-400-executives-reveal-future-ai-adoption</guid>
	<pubDate>Thu, 25 Sep 2025 17:00:00 UTC</pubDate>

</item>
<item>
	<title>Reliable, Compliant APIs with Akamai Managed Service for API Performance</title>
	<description>Introducing Akamai’s new product that blends proactive testing, expert analysis, and tailored optimization to help APIs stay reliable, responsive, and compliant.</description>
	<link>https://www.akamai.com/blog/security/2025/sep/reliable-compliant-apis-akamai-managed-service-api-performance</link>
	<author>Leslie Stansbury</author>
	<guid>https://www.akamai.com/blog/security/2025/sep/reliable-compliant-apis-akamai-managed-service-api-performance</guid>
	<pubDate>Wed, 24 Sep 2025 10:30:00 UTC</pubDate>

</item>
<item>
	<title>10 Evaluation Points for Your App Platform on Kubernetes</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/sep/ten-evaluation-points-app-platform-kubernetes</link>
	<author>Prasoon Pushkar</author>
	<guid>https://www.akamai.com/blog/cloud/2025/sep/ten-evaluation-points-app-platform-kubernetes</guid>
	<pubDate>Tue, 23 Sep 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Is the 2025 Customers' Choice in Online Fraud Detection</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/sep/akamai-2025-customers-choice-online-fraud-detection</link>
	<author>Emily Lyons</author>
	<guid>https://www.akamai.com/blog/security/2025/sep/akamai-2025-customers-choice-online-fraud-detection</guid>
	<pubDate>Mon, 22 Sep 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>From Scraping to Paying: Monetizing AI Bots at the Edge</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/sep/from-scraping-paying-monetizing-ai-bots-edge</link>
	<author>Emily Lyons</author>
	<guid>https://www.akamai.com/blog/security/2025/sep/from-scraping-paying-monetizing-ai-bots-edge</guid>
	<pubDate>Wed, 17 Sep 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Introducing Akamai Partner Connect: Built with You, for You</title>
	<description></description>
	<link>https://www.akamai.com/blog/partners/2025/sep/introducing-akamai-partner-connect</link>
	<author>Pablo Onnias</author>
	<guid>https://www.akamai.com/blog/partners/2025/sep/introducing-akamai-partner-connect</guid>
	<pubDate>Tue, 16 Sep 2025 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Move Over, DDoS: It’s the Era of Distributed Denial of Defense (DDoD)</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/sep/move-over-ddos-era-distributed-denial-of-defense-ddod</link>
	<author>Sven Dummer, Sandeep Rath &amp; Dennis Birchard</author>
	<guid>https://www.akamai.com/blog/security/2025/sep/move-over-ddos-era-distributed-denial-of-defense-ddod</guid>
	<pubDate>Tue, 16 Sep 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>How Companies Are Balancing AI Innovation with Risk</title>
	<description>A new Forrester report, commissioned by Akamai, reveals how companies are pursuing AI innovation at scale without exposure to unacceptable levels of risk.</description>
	<link>https://www.akamai.com/blog/cloud/2025/sep/how-companies-balancing-ai-innovation-with-risk</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/cloud/2025/sep/how-companies-balancing-ai-innovation-with-risk</guid>
	<pubDate>Mon, 15 Sep 2025 19:00:00 UTC</pubDate>

</item>
<item>
	<title>AI Training Data: Winning in the AI Boom</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/sep/ai-training-data-winning-ai-boom</link>
	<author>Jagdish Mohite</author>
	<guid>https://www.akamai.com/blog/security/2025/sep/ai-training-data-winning-ai-boom</guid>
	<pubDate>Mon, 15 Sep 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Boost the Performance and Security — and Lower the Costs — of AI Apps</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/sep/boost-performance-security-lower-costs-ai-apps</link>
	<author>Elan Shanker &amp; Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/2025/sep/boost-performance-security-lower-costs-ai-apps</guid>
	<pubDate>Thu, 11 Sep 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Understand the Attack Surface: Retail Supply Chain Cybersecurity Risks</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/sep/attack-surface-retail-supply-chain-cybersecurity-risks</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/2025/sep/attack-surface-retail-supply-chain-cybersecurity-risks</guid>
	<pubDate>Wed, 10 Sep 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Off Your Docker: Exposed APIs Are Targeted in New Malware Strain</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/sep/new-malware-targeting-docker-apis-akamai-hunt</link>
	<author>Yonatan Gilvarg</author>
	<guid>https://www.akamai.com/blog/security-research/2025/sep/new-malware-targeting-docker-apis-akamai-hunt</guid>
	<pubDate>Mon, 08 Sep 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Your AI Strategy Is Only as Strong as Your DNS</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/sep/ai-strategy-only-as-strong-as-dns</link>
	<author>Sandra Murphy</author>
	<guid>https://www.akamai.com/blog/security/2025/sep/ai-strategy-only-as-strong-as-dns</guid>
	<pubDate>Fri, 05 Sep 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Certificate Chaos and the Case for Automated Posture Management</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/sep/certificate-chaos-case-automated-posture-management</link>
	<author>Sandra Murphy &amp; Sven Dummer</author>
	<guid>https://www.akamai.com/blog/security/2025/sep/certificate-chaos-case-automated-posture-management</guid>
	<pubDate>Fri, 05 Sep 2025 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Breach Highlights AI and API Vulnerabilities in Software Supply Chains</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/sep/breach-highlights-ai-api-vulnerabilities-software-supply-chains</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/2025/sep/breach-highlights-ai-api-vulnerabilities-software-supply-chains</guid>
	<pubDate>Thu, 04 Sep 2025 16:00:00 UTC</pubDate>

</item>
<item>
	<title>Virtualized (In)Security: How Attackers Can Weaponize VBS Enclaves</title>
	<description>Read about Ori David’s presentation at DEF CON 33 and learn how attackers can abuse VBS enclaves, a Windows security feature, for malicious purposes.</description>
	<link>https://www.akamai.com/blog/security-research/2025/aug/virtualized-insecurity-attackers-weaponize-vbs-enclaves</link>
	<author>Ori David</author>
	<guid>https://www.akamai.com/blog/security-research/2025/aug/virtualized-insecurity-attackers-weaponize-vbs-enclaves</guid>
	<pubDate>Thu, 04 Sep 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Enables Post-Quantum Cryptography on the Edge</title>
	<description>Learn about the latest development in our post-quantum journey: Support for post-quantum cryptography on the Akamai edge.</description>
	<link>https://www.akamai.com/blog/security/2025/aug/akamai-enables-post-quantum-cryptography-edge</link>
	<author>Jan Schaumann</author>
	<guid>https://www.akamai.com/blog/security/2025/aug/akamai-enables-post-quantum-cryptography-edge</guid>
	<pubDate>Wed, 03 Sep 2025 19:00:00 UTC</pubDate>

</item>
<item>
	<title>These 4 Threats to AI Applications Require New Cybersecurity Strategies</title>
	<description>Learn about the four threat categories that today’s cybersecurity teams must address to protect their companies’ AI investments.</description>
	<link>https://www.akamai.com/blog/security/2025/aug/4-threats-ai-applications-new-cybersecurity-strategies</link>
	<author>Swati Kumar</author>
	<guid>https://www.akamai.com/blog/security/2025/aug/4-threats-ai-applications-new-cybersecurity-strategies</guid>
	<pubDate>Thu, 28 Aug 2025 19:00:00 UTC</pubDate>

</item>
<item>
	<title>An Inside Look at our Next Gen Object Storage Launch</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/aug/an-inside-look-at-our-next-gen-object-storage-launch</link>
	<author>Jason Tanabe</author>
	<guid>https://www.akamai.com/blog/developers/2025/aug/an-inside-look-at-our-next-gen-object-storage-launch</guid>
	<pubDate>Thu, 28 Aug 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Protect Critical Infrastructure: Cybersecurity Strategies for Governments</title>
	<description>Learn actionable strategies that can help state and local governments protect critical infrastructure and dramatically reduce risk exposure.</description>
	<link>https://www.akamai.com/blog/security/2025/aug/critical-infrastructure-protection-cybersecurity-strategies-governments</link>
	<author>Douglas Holland</author>
	<guid>https://www.akamai.com/blog/security/2025/aug/critical-infrastructure-protection-cybersecurity-strategies-governments</guid>
	<pubDate>Wed, 27 Aug 2025 19:00:00 UTC</pubDate>

</item>
<item>
	<title>BadSuccessor Is Dead, Long Live BadSuccessor(?)</title>
	<description>Read about Microsoft’s patch for BadSuccessor — a vulnerability in Windows Server Active Directory — and learn why its underlying mechanics still matter.</description>
	<link>https://www.akamai.com/blog/security-research/2025/aug/badsuccessor-is-dead-analyzing-badsuccessor-patch</link>
	<author>Yuval Gordon</author>
	<guid>https://www.akamai.com/blog/security-research/2025/aug/badsuccessor-is-dead-analyzing-badsuccessor-patch</guid>
	<pubDate>Wed, 27 Aug 2025 19:00:00 UTC</pubDate>

</item>
<item>
	<title>CVE-2025-54142: HTTP Request Smuggling via OPTIONS + Body</title>
	<description>Learn how Akamai InfoSec mitigated CVE-2025-54142 — an HTTP request smuggling vulnerability arising from OPTIONS requests with a body.</description>
	<link>https://www.akamai.com/blog/security-research/2025/aug/advisory-cve-2025-54142-http-request-smuggling-via-options-body</link>
	<author>Akamai InfoSec</author>
	<guid>https://www.akamai.com/blog/security-research/2025/aug/advisory-cve-2025-54142-http-request-smuggling-via-options-body</guid>
	<pubDate>Wed, 27 Aug 2025 19:00:00 UTC</pubDate>

</item>
<item>
	<title>Our New Premium Managed Databases Plan for Resource-Intensive Workloads</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/aug/our-new-premium-managed-databases-plan-for-resource-intensive-workloads</link>
	<author>Peter Sari (Peter Sari)</author>
	<guid>https://www.akamai.com/blog/developers/2025/aug/our-new-premium-managed-databases-plan-for-resource-intensive-workloads</guid>
	<pubDate>Wed, 27 Aug 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Boost EdgeWorker Observability: Set Up Logging With DataStream</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/aug/boost-edgeworker-observability-set-up-logging-with-datastream</link>
	<author>AJ Johnson</author>
	<guid>https://www.akamai.com/blog/developers/2025/aug/boost-edgeworker-observability-set-up-logging-with-datastream</guid>
	<pubDate>Tue, 26 Aug 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Marginal Emissions Rates: See Carbon Emissions with Clarity in Real Time</title>
	<description>Learn how Akamai is using marginal emissions rates to improve the transparency and accuracy of our emissions accounting.</description>
	<link>https://www.akamai.com/blog/sustainability/2025/aug/marginal-emissions-rates-see-carbon-emissions-real-time</link>
	<author>Katie Robinson</author>
	<guid>https://www.akamai.com/blog/sustainability/2025/aug/marginal-emissions-rates-see-carbon-emissions-real-time</guid>
	<pubDate>Mon, 25 Aug 2025 21:00:07 UTC</pubDate>

</item>
<item>
	<title>A New Way to Manage Property Configurations: Dynamic Rule Updates</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/aug/manage-property-configurations-dynamic-rule-updates</link>
	<author>Karthik Prabhu</author>
	<guid>https://www.akamai.com/blog/cloud/2025/aug/manage-property-configurations-dynamic-rule-updates</guid>
	<pubDate>Fri, 22 Aug 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Key Takeaways from KubeCon + CloudNativeCon India 2025</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/aug/key-takeaways-from-kubecon-cloudnativecon-india-2025</link>
	<author>Prasoon Pushkar</author>
	<guid>https://www.akamai.com/blog/developers/2025/aug/key-takeaways-from-kubecon-cloudnativecon-india-2025</guid>
	<pubDate>Fri, 22 Aug 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Stop LLM Attacks: How Security Helps AI Apps Achieve Their ROI</title>
	<description>AI security is a business problem. Protect your LLM application investment and ROI by connecting your security team with business stakeholders.</description>
	<link>https://www.akamai.com/blog/security/2025/aug/stop-llm-attacks-security-ai-apps-roi</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/2025/aug/stop-llm-attacks-security-ai-apps-roi</guid>
	<pubDate>Thu, 21 Aug 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Beats Other WAAP Vendors in Third-Party Evaluation</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/aug/akamai-beats-waap-vendors-third-party-evaluation</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/2025/aug/akamai-beats-waap-vendors-third-party-evaluation</guid>
	<pubDate>Wed, 20 Aug 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Benchmarking VPUs and GPUs for Media Workloads</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/aug/benchmarking-vpus-and-gpus-for-media-workloads</link>
	<author>Chris Milsted</author>
	<guid>https://www.akamai.com/blog/developers/2025/aug/benchmarking-vpus-and-gpus-for-media-workloads</guid>
	<pubDate>Tue, 19 Aug 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Accelerating Secure Enterprise Kubernetes Adoption</title>
	<description>Learn how LKE-E solves critical problems while providing streamlined adoption, operational simplicity, and cost efficiency at scale.</description>
	<link>https://www.akamai.com/blog/cloud/2025/aug/accelerate-adoption-enterprise-kubernetes-environments</link>
	<author>Patrick Jamal</author>
	<guid>https://www.akamai.com/blog/cloud/2025/aug/accelerate-adoption-enterprise-kubernetes-environments</guid>
	<pubDate>Mon, 18 Aug 2025 15:00:00 UTC</pubDate>

</item>
<item>
	<title>How Cloud Wrapper Evolved to Optimize Small-Object Caching</title>
	<description>Learn how Akamai's Cloud Wrapper evolved to optimize small-object caching, reduce egress costs, and boost SEO rankings for web and media assets.</description>
	<link>https://www.akamai.com/blog/developers/2025/aug/how-cloud-wrapper-evolved-to-optimize-small-object-caching</link>
	<author>Ansley Flanagan</author>
	<guid>https://www.akamai.com/blog/developers/2025/aug/how-cloud-wrapper-evolved-to-optimize-small-object-caching</guid>
	<pubDate>Mon, 18 Aug 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Named an Overall Leader for API Security by KuppingerCole</title>
	<description></description>
	<link>https://www.akamai.com/blog/news/2025/aug/akamai-overall-leader-for-api-security-kuppingercole</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/news/2025/aug/akamai-overall-leader-for-api-security-kuppingercole</guid>
	<pubDate>Fri, 15 Aug 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>The Edge of Agency: Defending Against the Risks of Agentic AI</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/aug/edge-of-agency-defending-against-risks-agentic-ai</link>
	<author>Maxim Zavodchik</author>
	<guid>https://www.akamai.com/blog/security/2025/aug/edge-of-agency-defending-against-risks-agentic-ai</guid>
	<pubDate>Fri, 15 Aug 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>The Reality of Modern Cyberattacks: Lessons from Recent Retail Breaches</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/aug/reality-modern-cyberattacks-lessons-retail-breaches</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/2025/aug/reality-modern-cyberattacks-lessons-retail-breaches</guid>
	<pubDate>Thu, 14 Aug 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Generative Personalization at the Edge: The Future of E‑Commerce Isn’t (Just) in the Cloud</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/aug/generative-personalization-at-the-edge</link>
	<author>Pedro Salvado</author>
	<guid>https://www.akamai.com/blog/developers/2025/aug/generative-personalization-at-the-edge</guid>
	<pubDate>Thu, 14 Aug 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Akamai and Bitmovin: Revolutionizing Live and On-Demand Video Streaming</title>
	<description>Discover how Akamai and Bitmovin’s partnership reduces costs, enhances performance, and delivers personalized video experiences to content providers.</description>
	<link>https://www.akamai.com/blog/cloud/2025/aug/akamai-bitmovin-revolutionizing-live-on-demand-video-streaming</link>
	<author>Adam Massaro</author>
	<guid>https://www.akamai.com/blog/cloud/2025/aug/akamai-bitmovin-revolutionizing-live-on-demand-video-streaming</guid>
	<pubDate>Wed, 13 Aug 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Agentic AI: How Autonomous Agents are Changing the Game</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/aug/agentic-ai-how-autonomous-agents-are-changing-the-game</link>
	<author>Vineeth Varughese</author>
	<guid>https://www.akamai.com/blog/developers/2025/aug/agentic-ai-how-autonomous-agents-are-changing-the-game</guid>
	<pubDate>Wed, 13 Aug 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>A Coordinated Response to MadeYouReset HTTP/2 Protocol Attacks</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/aug/response-madeyoureset-http2-protocol-attacks</link>
	<author>Mike Bishop</author>
	<guid>https://www.akamai.com/blog/security/2025/aug/response-madeyoureset-http2-protocol-attacks</guid>
	<pubDate>Wed, 13 Aug 2025 08:00:00 UTC</pubDate>

</item>
<item>
	<title>From Discovery to Testing: Akamai and Snyk Deliver Seamless API Security</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/aug/discovery-testing-akamai-snyk-seamless-api-security</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2025/aug/discovery-testing-akamai-snyk-seamless-api-security</guid>
	<pubDate>Tue, 12 Aug 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Visualize Security Success with the Security Summary Dashboard</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/aug/visualize-success-security-summary-dashboard</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/2025/aug/visualize-success-security-summary-dashboard</guid>
	<pubDate>Mon, 11 Aug 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>CVE-2025-32094: HTTP Request Smuggling Via OPTIONS + Obsolete Line Folding</title>
	<description>In March 2025, Akamai received a bug bounty report identifying an HTTP Request Smuggling vulnerability that was quickly resolved for all customers.</description>
	<link>https://www.akamai.com/blog/security/2025/aug/cve-2025-32094-http-request-smuggling</link>
	<author>Akamai InfoSec</author>
	<guid>https://www.akamai.com/blog/security/2025/aug/cve-2025-32094-http-request-smuggling</guid>
	<pubDate>Wed, 06 Aug 2025 18:00:00 UTC</pubDate>

</item>
<item>
	<title>Post-Quantum Cryptography Implementation Considerations in TLS</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/aug/post-quantum-cryptography-implementation-considerations-tls</link>
	<author>Jan Schaumann</author>
	<guid>https://www.akamai.com/blog/security/2025/aug/post-quantum-cryptography-implementation-considerations-tls</guid>
	<pubDate>Wed, 06 Aug 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>AI in Cloud Computing: How AI Is Revolutionizing the Landscape</title>
	<description>Discover how AI in cloud computing is transforming industries. Learn about the differences between cloud AI and edge AI — their benefits, use cases, and solutions.</description>
	<link>https://www.akamai.com/blog/cloud/2025/aug/ai-cloud-computing-revolutionizing-landscape</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/cloud/2025/aug/ai-cloud-computing-revolutionizing-landscape</guid>
	<pubDate>Tue, 05 Aug 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Open Source &amp; Fully Managed: Aiven-Powered Databases on Akamai</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/aug/open-source-fully-managed-aiven-powered-databases-on-akamai</link>
	<author>Peter Sari (Peter Sari)</author>
	<guid>https://www.akamai.com/blog/developers/2025/aug/open-source-fully-managed-aiven-powered-databases-on-akamai</guid>
	<pubDate>Tue, 05 Aug 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Why the Right Tool — and the Right Team — Are Essential for DNS Security</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/aug/why-right-tool-right-team-essential-dns-security</link>
	<author>Derek Hammack</author>
	<guid>https://www.akamai.com/blog/security/2025/aug/why-right-tool-right-team-essential-dns-security</guid>
	<pubDate>Mon, 04 Aug 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Why AI Systems Use Vector Databases to Improve Performance and Reduce Costs</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/aug/why-ai-systems-use-vector-databases-to-improve-performance-and-reduce-costs</link>
	<author>Amit Mohanty</author>
	<guid>https://www.akamai.com/blog/developers/2025/aug/why-ai-systems-use-vector-databases-to-improve-performance-and-reduce-costs</guid>
	<pubDate>Mon, 04 Aug 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Gartner Market Guide: Microsegmentation for Zero Trust and Resilience</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/aug/gartner-market-guide-microsegmentation-zero-trust-resilience</link>
	<author>Shivangi Sahu</author>
	<guid>https://www.akamai.com/blog/security/2025/aug/gartner-market-guide-microsegmentation-zero-trust-resilience</guid>
	<pubDate>Fri, 01 Aug 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>3 Key Areas to Focus on When You're Evaluating AI Security</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/aug/3-key-areas-focus-evaluating-ai-security</link>
	<author>Berk Veral</author>
	<guid>https://www.akamai.com/blog/security/2025/aug/3-key-areas-focus-evaluating-ai-security</guid>
	<pubDate>Fri, 01 Aug 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Publishers: How to Block AI Bots and Reclaim Control of Your Content</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/jul/publishers-how-to-block-ai-bots-reclaim-control-content</link>
	<author>Mani Sundaram</author>
	<guid>https://www.akamai.com/blog/security/2025/jul/publishers-how-to-block-ai-bots-reclaim-control-content</guid>
	<pubDate>Wed, 30 Jul 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Price of Poor Cybersecurity in 2024: US$3.1 Billion </title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/jul/the-price-poor-cybersecurity-2024-31-billion</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/2025/jul/the-price-poor-cybersecurity-2024-31-billion</guid>
	<pubDate>Wed, 30 Jul 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Surviving the Ransomware Gauntlet: A Test of Resilience</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/jul/surviving-ransomware-gauntlet-test-of-resilience</link>
	<author>Tricia Howard &amp; Maria Vlasak</author>
	<guid>https://www.akamai.com/blog/security-research/2025/jul/surviving-ransomware-gauntlet-test-of-resilience</guid>
	<pubDate>Tue, 29 Jul 2025 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Beyond Perimeter Defense: Implementing Zero Trust in Federal Agencies</title>
	<description>Learn how to address cybersecurity in this new perimeter-less world and get six steps to achieving Least Permissive Trust for federal agencies.</description>
	<link>https://www.akamai.com/blog/security/2025/jul/beyond-perimeter-defense-implementing-zero-trust-federal-agencies</link>
	<author>Micah Maryn</author>
	<guid>https://www.akamai.com/blog/security/2025/jul/beyond-perimeter-defense-implementing-zero-trust-federal-agencies</guid>
	<pubDate>Fri, 25 Jul 2025 19:00:00 UTC</pubDate>

</item>
<item>
	<title>CISA Recommends Segmentation &amp; Zero Trust to Combat Interlock Ransomware</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/jul/cisa-segmentation-zero-trust-combat-interlock-ransomware</link>
	<author>Jacob Abrams</author>
	<guid>https://www.akamai.com/blog/security/2025/jul/cisa-segmentation-zero-trust-combat-interlock-ransomware</guid>
	<pubDate>Thu, 24 Jul 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Coyote in the Wild: First-Ever Malware That Abuses UI Automation</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/jul/active-exploitation-coyote-malware-first-ui-automation-abuse-in-the-wild</link>
	<author>Tomer Peled</author>
	<guid>https://www.akamai.com/blog/security-research/2025/jul/active-exploitation-coyote-malware-first-ui-automation-abuse-in-the-wild</guid>
	<pubDate>Tue, 22 Jul 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Understand the SharePoint RCE: Exploitations, Detections, and Mitigations</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/jul/sharepoint-vulnerability-rce-active-exploitation-detections-mitigations</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2025/jul/sharepoint-vulnerability-rce-active-exploitation-detections-mitigations</guid>
	<pubDate>Tue, 22 Jul 2025 08:00:00 UTC</pubDate>

</item>
<item>
	<title>Why Customer Experience Is the New Battleground in Zero Trust</title>
	<description>Learn why being named a Customer Favorite in Forrester's Zero Trust Wave reveals what we believe really matters in cybersecurity. </description>
	<link>https://www.akamai.com/blog/security/2025/jul/why-customer-experience-new-battleground-zero-trust</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/2025/jul/why-customer-experience-new-battleground-zero-trust</guid>
	<pubDate>Mon, 21 Jul 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Why Observability Tools Tend to Fail at Scale</title>
	<description>Observability is no longer just about catching errors or checking if a server is up. In modern distributed systems, it’s about understanding behavior across dozens, if not thousands, of services, all running in different environments and generating massive amounts of data.</description>
	<link>https://www.akamai.com/blog/developers/2025/jul/why-observability-tools-tend-to-fail-at-scale</link>
	<author>Swati Kumar</author>
	<guid>https://www.akamai.com/blog/developers/2025/jul/why-observability-tools-tend-to-fail-at-scale</guid>
	<pubDate>Mon, 21 Jul 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>How Search Engines, LLMs, and Third-Party Scrapers Affect Bot Management</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/jul/search-engines-llms-third-party-scrapers-bot-management</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/2025/jul/search-engines-llms-third-party-scrapers-bot-management</guid>
	<pubDate>Mon, 21 Jul 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Optimizing Government Websites for Peak Traffic Events</title>
	<description>Learn how to proactively withstand peak traffic events and improve your government website’s performance and security posture.</description>
	<link>https://www.akamai.com/blog/performance/2025/jul/optimizing-government-websites-peak-traffic-events</link>
	<author>Chris Eldon &amp; Eric Bach</author>
	<guid>https://www.akamai.com/blog/performance/2025/jul/optimizing-government-websites-peak-traffic-events</guid>
	<pubDate>Fri, 18 Jul 2025 21:00:00 UTC</pubDate>

</item>
<item>
	<title>Vulnerable to Bulletproof: Protect TLS via Certificate Posture Management</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/jul/vulnerable-bulletproof-protect-tls-certificate-posture-management</link>
	<author>Sam Preston</author>
	<guid>https://www.akamai.com/blog/security/2025/jul/vulnerable-bulletproof-protect-tls-certificate-posture-management</guid>
	<pubDate>Fri, 18 Jul 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Cloud Cost Conundrum: Rising Expenses Hinder AI Innovation in Europe</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/jul/cloud-cost-conundrum-rising-expenses-hinder-ai-innovation-europe</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/cloud/2025/jul/cloud-cost-conundrum-rising-expenses-hinder-ai-innovation-europe</guid>
	<pubDate>Thu, 17 Jul 2025 09:00:00 UTC</pubDate>

</item>
<item>
	<title>One Year of Warm Migrations</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/jul/one-year-of-warm-migrations</link>
	<author>Abe Massry</author>
	<guid>https://www.akamai.com/blog/developers/2025/jul/one-year-of-warm-migrations</guid>
	<pubDate>Wed, 16 Jul 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>AI and LLM Bot Management Has Become a Business-Critical Issue: Do It Right</title>
	<description>AI bots, agents, and LLM scrapers all want your content. Here’s how to manage them so that they help, not hinder, your business.</description>
	<link>https://www.akamai.com/blog/security/2025/jul/ai-llm-bot-management-has-become-business-critical-issue</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/2025/jul/ai-llm-bot-management-has-become-business-critical-issue</guid>
	<pubDate>Tue, 15 Jul 2025 19:00:00 UTC</pubDate>

</item>
<item>
	<title>Securing the Frontier - Navigating Security in LLM-Integrated Systems</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/jul/introducing-akamai-cloud-pulse</link>
	<author>Prasoon Pushkar</author>
	<guid>https://www.akamai.com/blog/developers/2025/jul/introducing-akamai-cloud-pulse</guid>
	<pubDate>Tue, 15 Jul 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>From VPN to Zero Trust: Why It’s Time to Retire Traditional VPNs, Part 2</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/jul/vpn-zero-trust-time-retire-traditional-vpns-part-2</link>
	<author>Elad Lev &amp; Jim Black</author>
	<guid>https://www.akamai.com/blog/security/2025/jul/vpn-zero-trust-time-retire-traditional-vpns-part-2</guid>
	<pubDate>Tue, 15 Jul 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Three Ways to Launch Linode Kubernetes Engine Enterprise</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/jul/three-ways-to-launch-linode-kubernetes-engine-enterprise</link>
	<author>Gary Gaughan</author>
	<guid>https://www.akamai.com/blog/developers/2025/jul/three-ways-to-launch-linode-kubernetes-engine-enterprise</guid>
	<pubDate>Mon, 14 Jul 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>An Intentionally Engineered Platform for a More Responsible Internet</title>
	<description>Learn how Akamai delivers performance, security, and scale on a platform that's also built for sustainability.</description>
	<link>https://www.akamai.com/blog/sustainability/2025/jul/intentionally-engineered-platform-more-responsible-internet</link>
	<author>Owen Mattison</author>
	<guid>https://www.akamai.com/blog/sustainability/2025/jul/intentionally-engineered-platform-more-responsible-internet</guid>
	<pubDate>Mon, 14 Jul 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Prompt as a Rulebook - Guiding LLM Agents Beyond Basic Instructions</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/jul/the-prompt-as-a-rulebook-guiding-llm-agents-beyond-basic-instructions</link>
	<author>James Brown</author>
	<guid>https://www.akamai.com/blog/developers/2025/jul/the-prompt-as-a-rulebook-guiding-llm-agents-beyond-basic-instructions</guid>
	<pubDate>Thu, 10 Jul 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How AI Bots Are Rewriting the Rules of Publishing</title>
	<description>See how AI bots impact publishers and how Akamai helps you protect, control, and monetize your content as AI reshapes how people find information.</description>
	<link>https://www.akamai.com/blog/security/2025/jul/how-ai-bots-are-rewriting-rules-publishing</link>
	<author>Emily Lyons</author>
	<guid>https://www.akamai.com/blog/security/2025/jul/how-ai-bots-are-rewriting-rules-publishing</guid>
	<pubDate>Thu, 10 Jul 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Mitigating CitrixBleed 2 (CVE‑2025‑5777) NetScaler Memory Disclosure with App &amp; API Protector</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/jul/mitigating-citrixbleed-memory-vulnerability-ase</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2025/jul/mitigating-citrixbleed-memory-vulnerability-ase</guid>
	<pubDate>Thu, 10 Jul 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Secure Your Data with Automated Local Compute Disk &amp; Block Storage Volume Encryption</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/jul/introducing-automated-local-disk-data-encryption</link>
	<author>Maddie Presland</author>
	<guid>https://www.akamai.com/blog/developers/2025/jul/introducing-automated-local-disk-data-encryption</guid>
	<pubDate>Wed, 09 Jul 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Scalable Video Transcoding on Linode with Kubernetes and Capella</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/jul/scalable-video-transcoding-with-kubernetes-and-capella</link>
	<author>Talia Nassi</author>
	<guid>https://www.akamai.com/blog/developers/2024/jul/scalable-video-transcoding-with-kubernetes-and-capella</guid>
	<pubDate>Wed, 09 Jul 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Securing the Frontier - Navigating Security in LLM-Integrated Systems</title>
	<description>In the previous parts of this series, we've explored the exciting new ways Large Language Models (LLMs) can integrate with APIs and act as intelligent As we integrate LLMs deeper into our applications, the attack surface naturally expands.</description>
	<link>https://www.akamai.com/blog/developers/2025/jul/securing-the-frontier-navigating-security-in-llm-integrated-systems</link>
	<author>James Brown</author>
	<guid>https://www.akamai.com/blog/developers/2025/jul/securing-the-frontier-navigating-security-in-llm-integrated-systems</guid>
	<pubDate>Wed, 09 Jul 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Running Serverless Wasm Functions on the Edge with k3s and SpinKube</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/jul/spinkube-k3s</link>
	<author>Matt Butcher</author>
	<guid>https://www.akamai.com/blog/developers/2025/jul/spinkube-k3s</guid>
	<pubDate>Wed, 09 Jul 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Introducing wasi-grpc for Spin</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/sep/introducing-wasi-grpc</link>
	<author>Brian Hardock</author>
	<guid>https://www.akamai.com/blog/developers/2025/sep/introducing-wasi-grpc</guid>
	<pubDate>Wed, 09 Jul 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Announcing Spin 3.4</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/aug/announcing-spin-3-4</link>
	<author>Brian Hardock</author>
	<guid>https://www.akamai.com/blog/developers/2025/aug/announcing-spin-3-4</guid>
	<pubDate>Wed, 09 Jul 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Thwarting AI Bots with Edge Content Rewriting</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/oct/thwarting-bots-with-edge-content-rewriting</link>
	<author>Matt Butcher</author>
	<guid>https://www.akamai.com/blog/developers/2025/oct/thwarting-bots-with-edge-content-rewriting</guid>
	<pubDate>Wed, 09 Jul 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>The Media Player Is Critical to Streaming — and AMP2 Changes Everything</title>
	<description></description>
	<link>https://www.akamai.com/blog/performance/2025/sep/media-player-critical-streaming-amp2-changes-everything</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/performance/2025/sep/media-player-critical-streaming-amp2-changes-everything</guid>
	<pubDate>Wed, 09 Jul 2025 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Protect Client-Side Code and Certify the Authenticity of Data Collection</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/jul/protect-client-side-code-certify-authenticity-data-collection</link>
	<author>David Sénécal</author>
	<guid>https://www.akamai.com/blog/security-research/2025/jul/protect-client-side-code-certify-authenticity-data-collection</guid>
	<pubDate>Tue, 08 Jul 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The New Toolkit: LLMs, Prompts, and Basic Tool Interaction</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/jul/the-new-toolkit-llms-prompts-and-basic-tool-interaction</link>
	<author>James Brown</author>
	<guid>https://www.akamai.com/blog/developers/2025/jul/the-new-toolkit-llms-prompts-and-basic-tool-interaction</guid>
	<pubDate>Thu, 03 Jul 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Real Performance Improvements 2025</title>
	<description></description>
	<link>https://www.akamai.com/blog/performance/2025/jul/real-performance-improvements-2025</link>
	<author>Tim Vereecke &amp; Robin Marx</author>
	<guid>https://www.akamai.com/blog/performance/2025/jul/real-performance-improvements-2025</guid>
	<pubDate>Thu, 03 Jul 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Linode Terraform Provider v3.0.0</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/jul/linode-terraform-provider-v3-0-0</link>
	<author>Linode (Linode)</author>
	<guid>https://www.akamai.com/blog/developers/2025/jul/linode-terraform-provider-v3-0-0</guid>
	<pubDate>Wed, 02 Jul 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Agentic AI Is Here — and It’s Shaping the Future of Bot Defense</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/jul/agentic-ai-here-shaping-future-bot-defense</link>
	<author>Tsvika Klein</author>
	<guid>https://www.akamai.com/blog/security/2025/jul/agentic-ai-here-shaping-future-bot-defense</guid>
	<pubDate>Wed, 02 Jul 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Skip the Complexity: Akamai App Platform Makes Kubernetes Production-Ready - Now in GA</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/jul/akamai-app-platform-makes-kubernetes-production-ready</link>
	<author>Sander Rodenhuis (Sander Rodenhuis)</author>
	<guid>https://www.akamai.com/blog/developers/2025/jul/akamai-app-platform-makes-kubernetes-production-ready</guid>
	<pubDate>Tue, 01 Jul 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Operationalize Day-2 Services for API Security and Microsegmentation</title>
	<description>Learn how to turn post-deployment services into a revenue opportunity and provide ongoing value for your customers with industry-leading tools and service playbooks.</description>
	<link>https://www.akamai.com/blog/partners/2025/jul/operationalize-day-2-services-api-security-microsegmentation</link>
	<author>Adam Mittler</author>
	<guid>https://www.akamai.com/blog/partners/2025/jul/operationalize-day-2-services-api-security-microsegmentation</guid>
	<pubDate>Tue, 01 Jul 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Commitment to Powering Europe’s Digital Sovereignty and Competitiveness</title>
	<description>Akamai remains committed to supporting our customers’ European digital sovereignty with our suite of robust, secure, and high-performing solutions.</description>
	<link>https://www.akamai.com/blog/security/2025/jul/commitment-powering-europes-digital-sovereignty-competitiveness</link>
	<author>Natalie Billingham</author>
	<guid>https://www.akamai.com/blog/security/2025/jul/commitment-powering-europes-digital-sovereignty-competitiveness</guid>
	<pubDate>Tue, 01 Jul 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Dangling Danger: Why You Need to Focus on Your DNS Posture Management</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/jun/dangling-danger-why-focus-dns-posture-management</link>
	<author>Tony Lauro</author>
	<guid>https://www.akamai.com/blog/security/2025/jun/dangling-danger-why-focus-dns-posture-management</guid>
	<pubDate>Mon, 30 Jun 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>The Paradigm Shift: From Traditional APIs to Language-Driven Integration</title>
	<description>Large language models (LLMs) are changing the game, offering a new way for systems to interact based on understanding language, not just strict formats. </description>
	<link>https://www.akamai.com/blog/developers/2025/jun/from-traditional-apis-to-language-driven-integration</link>
	<author>James Brown</author>
	<guid>https://www.akamai.com/blog/developers/2025/jun/from-traditional-apis-to-language-driven-integration</guid>
	<pubDate>Thu, 26 Jun 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Study Reveals API Security Gaps in Asia-Pacific Compliance Programs</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/jun/study-api-security-gaps-asia-pacific-compliance</link>
	<author>Reuben Koh</author>
	<guid>https://www.akamai.com/blog/security/2025/jun/study-api-security-gaps-asia-pacific-compliance</guid>
	<pubDate>Thu, 26 Jun 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Keep Your Tech FLAME Alive: Akamai Trailblazer Maite Vitar</title>
	<description></description>
	<link>https://www.akamai.com/blog/culture/2025/jun/keep-your-tech-flame-alive-akamai-trailblazer-maite-vitar</link>
	<author>Akamai FLAME Team</author>
	<guid>https://www.akamai.com/blog/culture/2025/jun/keep-your-tech-flame-alive-akamai-trailblazer-maite-vitar</guid>
	<pubDate>Wed, 25 Jun 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Cryptominers’ Anatomy: Shutting Down Mining Botnets</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/jun/cryptominers-anatomy-shutting-down-mining-botnets</link>
	<author>Maor Dahan</author>
	<guid>https://www.akamai.com/blog/security-research/2025/jun/cryptominers-anatomy-shutting-down-mining-botnets</guid>
	<pubDate>Tue, 24 Jun 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Improve Your Security with Attack Insights in Web Security Analytics</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/jun/improve-security-attack-insights-web-security-analytics</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/2025/jun/improve-security-attack-insights-web-security-analytics</guid>
	<pubDate>Mon, 23 Jun 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Building a Quantum-Safe Internet: The IETF's Plan for TLS</title>
	<description>Learn about the latest initiatives in post-quantum cryptography, including the IETF’s plan for securing TLS.</description>
	<link>https://www.akamai.com/blog/trends/2025/jun/building-quantum-safe-internet-ietf-plan-tls</link>
	<author> Rich Salz</author>
	<guid>https://www.akamai.com/blog/trends/2025/jun/building-quantum-safe-internet-ietf-plan-tls</guid>
	<pubDate>Wed, 18 Jun 2025 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Enhancements to Akamai API Security, Q2 2025</title>
	<description>Akamai API Security updates 3.48 and 3.49 include Compliance Dashboard enhancements, integration with Zuplo API gateway, and expanded sensor coverage.</description>
	<link>https://www.akamai.com/blog/security/2025/jun/enhancements-to-akamai-api-security-q2-2025</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2025/jun/enhancements-to-akamai-api-security-q2-2025</guid>
	<pubDate>Mon, 16 Jun 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>API Security Under Federal Scrutiny: A Wake-Up Call for CIOs</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/jun/api-security-federal-scrutiny-wake-up-call-cios</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2025/jun/api-security-federal-scrutiny-wake-up-call-cios</guid>
	<pubDate>Fri, 13 Jun 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Secure Your Enterprise with Robust DNS: A Guide to NIST SP 800-81r3</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/jun/secure-enterprise-dns-guide-nist-sp-800-81r3</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/2025/jun/secure-enterprise-dns-guide-nist-sp-800-81r3</guid>
	<pubDate>Thu, 12 Jun 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Enhance Your Edge Native Apps with Low Latency Using Multiple EdgeWorkers</title>
	<description>Learn how Flexible Composition lets you seamlessly deploy multiple EdgeWorkers in a single request for easier-to-build, scalable, edge native applications. </description>
	<link>https://www.akamai.com/blog/edge/2025/jun/enhance-edge-native-apps-low-latency-multiple-edgeworkers</link>
	<author>Hitoshi Kaneko &amp; Yo Nishiyama</author>
	<guid>https://www.akamai.com/blog/edge/2025/jun/enhance-edge-native-apps-low-latency-multiple-edgeworkers</guid>
	<pubDate>Wed, 11 Jun 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Beyond Implementation: Building a Zero Trust Strategy That Works</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/jun/beyond-implementation-building-zero-trust-strategy-works</link>
	<author>Shivangi Sahu</author>
	<guid>https://www.akamai.com/blog/security/2025/jun/beyond-implementation-building-zero-trust-strategy-works</guid>
	<pubDate>Wed, 11 Jun 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Two Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/jun/botnets-flaw-mirai-spreads-through-wazuh-vulnerability</link>
	<author>Kyle Lefton &amp; Daniel Messing</author>
	<guid>https://www.akamai.com/blog/security-research/2025/jun/botnets-flaw-mirai-spreads-through-wazuh-vulnerability</guid>
	<pubDate>Mon, 09 Jun 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Innovation, Not Infrastructure: Akamai’s Managed Cloud Services</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/jun/innovation-infrastructure-akamai-managed-service-compute</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/cloud/2025/jun/innovation-infrastructure-akamai-managed-service-compute</guid>
	<pubDate>Fri, 06 Jun 2025 09:00:00 UTC</pubDate>

</item>
<item>
	<title>Introducing New Networking Capabilities for LKE-Enterprise</title>
	<description>Modern enterprise applications require a robust, scalable, and secure networking infrastructure.</description>
	<link>https://www.akamai.com/blog/developers/2025/jun/introducing-new-networking-capabilities-for-lke-enterprise</link>
	<author>Prasoon Pushkar</author>
	<guid>https://www.akamai.com/blog/developers/2025/jun/introducing-new-networking-capabilities-for-lke-enterprise</guid>
	<pubDate>Thu, 05 Jun 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Fog Computing vs. Edge Computing: Their Roles in Modern Technology</title>
	<description>Fog computing vs. edge computing: Understand how they compare, their unique benefits, and which is best for your data processing needs in IoT and beyond.</description>
	<link>https://www.akamai.com/blog/edge/2025/jun/fog-computing-edge-computing-roles-modern-technology</link>
	<author>Mike Elissen</author>
	<guid>https://www.akamai.com/blog/edge/2025/jun/fog-computing-edge-computing-roles-modern-technology</guid>
	<pubDate>Thu, 05 Jun 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Navigating the Future of Scope 2: Balancing Impact and Practicality</title>
	<description>The Greenhouse Gas Protocol’s Scope 2 revisions demand thoughtful action. Read how we’re prioritizing meaningful, measurable impact over rapid progress.</description>
	<link>https://www.akamai.com/blog/sustainability/2025/jun/navigating-future-scope-2-balancing-impact-practicality</link>
	<author>Mike Mattera</author>
	<guid>https://www.akamai.com/blog/sustainability/2025/jun/navigating-future-scope-2-balancing-impact-practicality</guid>
	<pubDate>Thu, 05 Jun 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Why It’s Time to Retire Traditional VPNs, Part 1</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/jun/why-time-retire-traditional-vpns-part-1</link>
	<author>Elad Lev &amp; Jim Black</author>
	<guid>https://www.akamai.com/blog/security/2025/jun/why-time-retire-traditional-vpns-part-1</guid>
	<pubDate>Wed, 04 Jun 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Honoring Innovation, Growth, and Collaboration: The Akamai Partner Awards</title>
	<description>Introducing the Akamai Partner Awards, which recognize excellence — both organizational and individual — in sales, services, marketing, and technical impact.</description>
	<link>https://www.akamai.com/blog/partners/2025/jun/honoring-innovation-growth-collaboration-akamai-partner-awards</link>
	<author>Prince Jason Albert </author>
	<guid>https://www.akamai.com/blog/partners/2025/jun/honoring-innovation-growth-collaboration-akamai-partner-awards</guid>
	<pubDate>Tue, 03 Jun 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Introducing Akamai DNS Posture Management</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/jun/introducing-akamai-dns-posture-management</link>
	<author>Sandra Murphy</author>
	<guid>https://www.akamai.com/blog/security/2025/jun/introducing-akamai-dns-posture-management</guid>
	<pubDate>Tue, 03 Jun 2025 06:30:00 UTC</pubDate>

</item>
<item>
	<title>The Akamai Innovation Tour: A Journey in Perspective and Partnership</title>
	<description>“What does innovation mean to you?” Read how one marketer answered that question after attending the 2025 Akamai Innovation Tour.</description>
	<link>https://www.akamai.com/blog/partners/2025/may/akamai-innovation-tour-journey-perspective-partnership</link>
	<author>Nick Watkins</author>
	<guid>https://www.akamai.com/blog/partners/2025/may/akamai-innovation-tour-journey-perspective-partnership</guid>
	<pubDate>Fri, 30 May 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Damage Control: Why Building Cyber Resilience Is Non-Negotiable</title>
	<description>It’s only a matter of time before attackers find a crack in your security armour. Learn how to combine resilience with compliance and protect what matters most.</description>
	<link>https://www.akamai.com/blog/security/2025/may/damage-control-why-building-cyber-resilience-non-negotiable</link>
	<author>Richard Meeus</author>
	<guid>https://www.akamai.com/blog/security/2025/may/damage-control-why-building-cyber-resilience-non-negotiable</guid>
	<pubDate>Thu, 29 May 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>App Platform Updates: Customizable Catalog, Git-Based Secrets Management, and Automated Management of K8s Projects</title>
	<description>In this blog, we’ll shortly touch on App Platform’s new features and improvements, plus we’ll look ahead at some major changes that are in our pipeline.</description>
	<link>https://www.akamai.com/blog/developers/2025/may/app-platform-updates</link>
	<author>Sander Rodenhuis (Sander Rodenhuis)</author>
	<guid>https://www.akamai.com/blog/developers/2025/may/app-platform-updates</guid>
	<pubDate>Tue, 27 May 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>AI in Cybersecurity: How AI Is Impacting the Fight Against Cybercrime</title>
	<description>AI is transforming cybersecurity. Explore how hackers use AI for cybercrimes and how cybersecurity experts use AI to prevent, detect, and respond to attacks.</description>
	<link>https://www.akamai.com/blog/security/2025/may/ai-cybersecurity-how-impacting-fight-against-cybercrime</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/2025/may/ai-cybersecurity-how-impacting-fight-against-cybercrime</guid>
	<pubDate>Thu, 22 May 2025 19:00:00 UTC</pubDate>

</item>
<item>
	<title>Forget Perfect Prevention — Build Cyber Resilience Instead</title>
	<description>Discover why shifting from cyberattack prevention to cyber resilience is the key to survival in today’s relentless cyberthreat landscape.</description>
	<link>https://www.akamai.com/blog/security/2025/may/forget-perfect-prevention-build-cyber-resilience-instead</link>
	<author>Brent Maynard</author>
	<guid>https://www.akamai.com/blog/security/2025/may/forget-perfect-prevention-build-cyber-resilience-instead</guid>
	<pubDate>Thu, 22 May 2025 11:00:00 UTC</pubDate>

</item>
<item>
	<title>The Rise of the LLM AI Scrapers: What It Means for Bot Management</title>
	<description>Explore the rise of LLM AI scrapers and learn how to adapt to growing bot traffic with data-backed insights from our research.</description>
	<link>https://www.akamai.com/blog/security/2025/may/rise-llm-ai-scrapers-bot-management</link>
	<author>Tom Emmons &amp; Rob Lester</author>
	<guid>https://www.akamai.com/blog/security/2025/may/rise-llm-ai-scrapers-bot-management</guid>
	<pubDate>Wed, 21 May 2025 19:00:00 UTC</pubDate>

</item>
<item>
	<title>BadSuccessor: Abusing dMSA to Escalate Privileges in Active Directory</title>
	<description>Akamai researchers found a privilege escalation vulnerability in Windows Server 2025 that allows attackers to compromise any user in Active Directory.</description>
	<link>https://www.akamai.com/blog/security-research/2025/may/abusing-dmsa-for-privilege-escalation-in-active-directory</link>
	<author>Yuval Gordon</author>
	<guid>https://www.akamai.com/blog/security-research/2025/may/abusing-dmsa-for-privilege-escalation-in-active-directory</guid>
	<pubDate>Wed, 21 May 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Fine-Tuning Your Managed Databases: Optimize Performance with Advanced Parameters</title>
	<description>Managed database services (DBaaS) provide a powerful and scalable approach to deploying and managing databases without the overhead of manual maintenance.</description>
	<link>https://www.akamai.com/blog/developers/2025/may/fine-tuning-your-managed-databases</link>
	<author>Peter Sari (Peter Sari)</author>
	<guid>https://www.akamai.com/blog/developers/2025/may/fine-tuning-your-managed-databases</guid>
	<pubDate>Wed, 21 May 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Compliance Insights: How to Stop Lateral Movement and Boost Authorization</title>
	<description>Stop lateral movement before it starts. Learn how to meet security compliance regulations with layered security, microsegmentation, and smart API protection.</description>
	<link>https://www.akamai.com/blog/security/2025/may/compliance-insights-stop-lateral-movement-boost-authorization</link>
	<author>John Natale</author>
	<guid>https://www.akamai.com/blog/security/2025/may/compliance-insights-stop-lateral-movement-boost-authorization</guid>
	<pubDate>Mon, 19 May 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Scope 3, Category 8: What Akamai Is Doing for Customer Reporting</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2025/may/what-akamai-is-doing-for-customer-reporting</link>
	<author>Mike Mattera</author>
	<guid>https://www.akamai.com/blog/sustainability/2025/may/what-akamai-is-doing-for-customer-reporting</guid>
	<pubDate>Mon, 19 May 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Locked Out and Held for Ransom: A City's Battle Against Cybercrime</title>
	<description>Read how having a plan and doing some preparation in advance can lessen the severity of a ransomware attack — or prevent one altogether.</description>
	<link>https://www.akamai.com/blog/security/2025/may/locked-out-held-ransom-citys-battle-against-cybercrime</link>
	<author>Douglas Holland</author>
	<guid>https://www.akamai.com/blog/security/2025/may/locked-out-held-ransom-citys-battle-against-cybercrime</guid>
	<pubDate>Thu, 15 May 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Comparing Video Processing Units (VPUs), GPUs, and CPUs</title>
	<description>More users than ever subscribe to on-demand media streaming and engage with live streaming video over the internet, rather than broadcast television.</description>
	<link>https://www.akamai.com/blog/developers/2025/may/cpu-gpu-video-processing-unit-comparison</link>
	<author>Maddie Presland</author>
	<guid>https://www.akamai.com/blog/developers/2025/may/cpu-gpu-video-processing-unit-comparison</guid>
	<pubDate>Wed, 14 May 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Unlock New Growth Opportunities with Akamai Campaign Builder</title>
	<description></description>
	<link>https://www.akamai.com/blog/partners/2025/may/unlock-new-growth-opportunities-akamai-campaign-builder</link>
	<author>Gabriela Grigoras</author>
	<guid>https://www.akamai.com/blog/partners/2025/may/unlock-new-growth-opportunities-akamai-campaign-builder</guid>
	<pubDate>Wed, 14 May 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>A DDoS Attack Just Breached Your Defenses — Now What?</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/may/ddos-attack-breached-your-defenses-now-what</link>
	<author>Bruce Van Nice, Sandeep Rath, Dennis Birchard &amp; Gabriel Bellas</author>
	<guid>https://www.akamai.com/blog/security/2025/may/ddos-attack-breached-your-defenses-now-what</guid>
	<pubDate>Tue, 13 May 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Introducing Linode Interfaces: Better Network Management (Open Beta)</title>
	<description>Join the beta for Linode Interfaces, a new network management tool offering clearer configurations, better security, and smarter routing.</description>
	<link>https://www.akamai.com/blog/developers/2025/may/introducing-linode-interfaces</link>
	<author>Prasoon Pushkar</author>
	<guid>https://www.akamai.com/blog/developers/2025/may/introducing-linode-interfaces</guid>
	<pubDate>Tue, 13 May 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Gain Deeper Visibility into Risks to Meet Security Compliance Demands</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/may/gain-visibility-risks-meet-security-compliance-demands</link>
	<author>John Natale</author>
	<guid>https://www.akamai.com/blog/security/2025/may/gain-visibility-risks-meet-security-compliance-demands</guid>
	<pubDate>Fri, 09 May 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Creating A Clear Cloud with Account Service Limits and Quotas</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/may/creating-a-clear-cloud-with-account-service-limits-and-quotas</link>
	<author>Maddie Presland</author>
	<guid>https://www.akamai.com/blog/developers/2025/may/creating-a-clear-cloud-with-account-service-limits-and-quotas</guid>
	<pubDate>Thu, 08 May 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Kubernetes IngressNightmare: Wake Up and Fight Back with Microsegmentation</title>
	<description>Discover how to defend Kubernetes from Ingress vulnerabilities with microsegmentation and Zero Trust security from Akamai. Stay protected — inside and out.</description>
	<link>https://www.akamai.com/blog/security/2025/may/kubernetes-ingressnightmare-wake-up-fight-back-microsegmentation</link>
	<author>Yaniv Zadok &amp; Jacob Abrams</author>
	<guid>https://www.akamai.com/blog/security/2025/may/kubernetes-ingressnightmare-wake-up-fight-back-microsegmentation</guid>
	<pubDate>Wed, 07 May 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Here Comes Mirai: IoT Devices RSVP to Active Exploitation</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/may/active-exploitation-mirai-geovision-iot-botnet</link>
	<author>Kyle Lefton</author>
	<guid>https://www.akamai.com/blog/security-research/2025/may/active-exploitation-mirai-geovision-iot-botnet</guid>
	<pubDate>Tue, 06 May 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Distributed AI Inference: Strategies for Success</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/may/distributed-ai-inference-strategies-for-success</link>
	<author>Vineeth Varughese</author>
	<guid>https://www.akamai.com/blog/developers/2025/may/distributed-ai-inference-strategies-for-success</guid>
	<pubDate>Fri, 02 May 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Bolster Your Regulatory Compliance with Layered Security Measures</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/may/bolster-regulatory-compliance-with-layered-security-measures</link>
	<author>John Natale</author>
	<guid>https://www.akamai.com/blog/security/2025/may/bolster-regulatory-compliance-with-layered-security-measures</guid>
	<pubDate>Fri, 02 May 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Optimize Application Performance Across Germany with New Berlin Distributed Region</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/may/new-berlin-distributed-compute-region</link>
	<author>Maddie Presland</author>
	<guid>https://www.akamai.com/blog/developers/2025/may/new-berlin-distributed-compute-region</guid>
	<pubDate>Thu, 01 May 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Firewall for AI: Get Powerful Protection for New LLM App Threats</title>
	<description> Protect against LLM attacks such as prompt injection, exfiltration and extraction, and toxic AI outputs with Akamai Firewall for AI.</description>
	<link>https://www.akamai.com/blog/security/2025/apr/protect-against-llm-attacks-with-akamai-firewall-for-ai</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/2025/apr/protect-against-llm-attacks-with-akamai-firewall-for-ai</guid>
	<pubDate>Tue, 29 Apr 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Combat Rising Account Abuse: Akamai and Ping Identity Partner Up</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/apr/akamai-and-ping-identity-partner-up</link>
	<author>Emily Lyons</author>
	<guid>https://www.akamai.com/blog/security/2025/apr/akamai-and-ping-identity-partner-up</guid>
	<pubDate>Mon, 28 Apr 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Portability and Developer Control: 5 Key Takeaways from NAB 2025</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/apr/5-key-takeaways-from-nab-2025</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/developers/2025/apr/5-key-takeaways-from-nab-2025</guid>
	<pubDate>Fri, 25 Apr 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>AI Is Starting to Flex Its Network Security Muscles</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/apr/ai-starting-flex-network-security-muscles</link>
	<author>Garrett Weber</author>
	<guid>https://www.akamai.com/blog/security/2025/apr/ai-starting-flex-network-security-muscles</guid>
	<pubDate>Fri, 25 Apr 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Capture, Replicate, Deploy: Image Service Upgrades Now Available</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/apr/image-service-improvements-akamai-cdn</link>
	<author>Maddie Presland</author>
	<guid>https://www.akamai.com/blog/developers/2025/apr/image-service-improvements-akamai-cdn</guid>
	<pubDate>Thu, 24 Apr 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Deployments to Dollars: Turning Services into Recurring Revenue</title>
	<description></description>
	<link>https://www.akamai.com/blog/partners/2025/apr/deployments-dollars-turning-services-into-recurring-revenue</link>
	<author>Adam Mittler</author>
	<guid>https://www.akamai.com/blog/partners/2025/apr/deployments-dollars-turning-services-into-recurring-revenue</guid>
	<pubDate>Thu, 24 Apr 2025 09:00:00 UTC</pubDate>

</item>
<item>
	<title>A Sustainability Program with Regional Nuance</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2025/apr/a-sustainability-program-with-regional-nuance</link>
	<author>Owen Mattison</author>
	<guid>https://www.akamai.com/blog/sustainability/2025/apr/a-sustainability-program-with-regional-nuance</guid>
	<pubDate>Tue, 22 Apr 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>The AI-Powered Reboot: Rethinking Defense for Web Apps and APIs</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/apr/rethinking-defense-web-apps-api-new-soti</link>
	<author>Tricia Howard</author>
	<guid>https://www.akamai.com/blog/security-research/2025/apr/rethinking-defense-web-apps-api-new-soti</guid>
	<pubDate>Tue, 22 Apr 2025 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Helping Our Customers Develop a Sustainability Strategy</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2025/apr/helping-our-customers-develop-a-sustainability-strategy</link>
	<author>Owen Mattison</author>
	<guid>https://www.akamai.com/blog/sustainability/2025/apr/helping-our-customers-develop-a-sustainability-strategy</guid>
	<pubDate>Mon, 21 Apr 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Data Is on the Menu — and AI’s Market Price Is High</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/apr/llm-scraper-bots-data-collection</link>
	<author>Tricia Howard</author>
	<guid>https://www.akamai.com/blog/security/2025/apr/llm-scraper-bots-data-collection</guid>
	<pubDate>Fri, 18 Apr 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai API Security Enhancements</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/apr/akamai-api-security-enhancements</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2025/apr/akamai-api-security-enhancements</guid>
	<pubDate>Thu, 17 Apr 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>API Security Is Key to Cyber Resilience in Media and Entertainment</title>
	<description>For media and entertainment companies, API expansion means a broader attack surface. Security needs to stay a step ahead.</description>
	<link>https://www.akamai.com/blog/security/2025/apr/api-security-key-to-cyber-resilience-media-entertainment</link>
	<author>Beata Majek-Adamczyk</author>
	<guid>https://www.akamai.com/blog/security/2025/apr/api-security-key-to-cyber-resilience-media-entertainment</guid>
	<pubDate>Wed, 16 Apr 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What Are the Benefits of a Microservices Architecture?</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/apr/benefits-of-a-microservices-architecture</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/cloud/2025/apr/benefits-of-a-microservices-architecture</guid>
	<pubDate>Tue, 15 Apr 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title> Private Networking in Distributed Compute Regions with VPC</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/apr/private-networking-distributed-regions-vpc</link>
	<author>Maddie Presland</author>
	<guid>https://www.akamai.com/blog/developers/2025/apr/private-networking-distributed-regions-vpc</guid>
	<pubDate>Tue, 15 Apr 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Sharing Is (Not) Caring: How Shared Credentials Open the Door to Breaches</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/apr/sharing-is-caring-third-party-risk-code-shared-credentials</link>
	<author>Tomer Peled</author>
	<guid>https://www.akamai.com/blog/security-research/2025/apr/sharing-is-caring-third-party-risk-code-shared-credentials</guid>
	<pubDate>Mon, 14 Apr 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Cloud Migration Strategy: The Step-By-Step Framework and Benefits</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2024/jun/cloud-migration-strategy</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/cloud/2024/jun/cloud-migration-strategy</guid>
	<pubDate>Fri, 11 Apr 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What Is DNSSEC, and How Does It Work?</title>
	<description></description>
	<link>https://www.akamai.com/blog/trends/dnssec-how-it-works-key-considerations</link>
	<author>Sam Preston</author>
	<guid>https://www.akamai.com/blog/trends/dnssec-how-it-works-key-considerations</guid>
	<pubDate>Fri, 11 Apr 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>It’s All in the Cards: Preventing Payment Abuse for Retailers</title>
	<description>Carding attacks have become a serious challenge for retailers. Learn how Akamai Account Protector can help organizations defend against payment abuse.</description>
	<link>https://www.akamai.com/blog/security/2025/apr/its-all-in-the-cards-preventing-payment-abuse-retailers</link>
	<author>Emily Lyons</author>
	<guid>https://www.akamai.com/blog/security/2025/apr/its-all-in-the-cards-preventing-payment-abuse-retailers</guid>
	<pubDate>Fri, 11 Apr 2025 08:30:00 UTC</pubDate>

</item>
<item>
	<title>Consistent Security Everywhere: Akamai Makes Leading WAF Technology CDN-Agnostic</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/apr/akamai-makes-leading-waf-technology-cdn-agnostic</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/2025/apr/akamai-makes-leading-waf-technology-cdn-agnostic</guid>
	<pubDate>Wed, 09 Apr 2025 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Critical Linux RCE Vulnerability in CUPS — What We Know and How to Prepare</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/sep/guidance-on-critical-cups-rce</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2024/sep/guidance-on-critical-cups-rce</guid>
	<pubDate>Tue, 08 Apr 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>DDoS Attack Trends in 2024 Signify That Sophistication Overshadows Size</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/apr/ddos-attack-trends-2024-signify-sophistication-overshadows-size</link>
	<author>Sven Dummer, Dennis Birchard, Sandeep Rath &amp; Bruce Van Nice</author>
	<guid>https://www.akamai.com/blog/security/2025/apr/ddos-attack-trends-2024-signify-sophistication-overshadows-size</guid>
	<pubDate>Mon, 07 Apr 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Speed with Precision: Early and Accurate Response to Apache Camel CVEs</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/apr/early-and-accurate-response-to-apache-camel-cves</link>
	<author>Danielle Walter &amp; Tim Cote</author>
	<guid>https://www.akamai.com/blog/security/2025/apr/early-and-accurate-response-to-apache-camel-cves</guid>
	<pubDate>Mon, 07 Apr 2025 09:00:00 UTC</pubDate>

</item>
<item>
	<title>Cloud for the Streaming Era: Introducing Accelerated Compute</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/apr/new-accelerated-compute-netint-vpu-plans</link>
	<author>Maddie Presland</author>
	<guid>https://www.akamai.com/blog/developers/2025/apr/new-accelerated-compute-netint-vpu-plans</guid>
	<pubDate>Thu, 03 Apr 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Unlocking the Next Wave of Edge Computing with Serverless WebAssembly</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/apr/unlocking-next-wave-edge-computing-serverless-webassembly</link>
	<author>Brent Eiler &amp; Matt Butcher</author>
	<guid>https://www.akamai.com/blog/cloud/2025/apr/unlocking-next-wave-edge-computing-serverless-webassembly</guid>
	<pubDate>Tue, 01 Apr 2025 16:00:00 UTC</pubDate>

</item>
<item>
	<title>Anatomy of a SYN-ACK Attack</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/anatomy-of-a-syn-ack-attack</link>
	<author>Chad Seaman</author>
	<guid>https://www.akamai.com/blog/security/anatomy-of-a-syn-ack-attack</guid>
	<pubDate>Tue, 01 Apr 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Production-Grade K8s without Complexity: Introducing LKE-Enterprise</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/mar/launching-lke-enterprise</link>
	<author>Hana Jeddy</author>
	<guid>https://www.akamai.com/blog/developers/2025/mar/launching-lke-enterprise</guid>
	<pubDate>Mon, 31 Mar 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Securing Video Contribution Feeds with Akamai’s Distributed Cloud &amp; CDN</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/mar/securing-video-contribution-feeds-with-akamais-distributed-cloud-amp-cdn</link>
	<author>David Eisenbacher</author>
	<guid>https://www.akamai.com/blog/developers/2025/mar/securing-video-contribution-feeds-with-akamais-distributed-cloud-amp-cdn</guid>
	<pubDate>Fri, 28 Mar 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Enhancing Public Sector Cybersecurity with Akamai API Security</title>
	<description>Learn how Akamai's API security solution helps federal agencies identify, protect, and monitor API traffic in real time.</description>
	<link>https://www.akamai.com/blog/security/2025/mar/enhancing-public-sector-cybersecurity-with-akamai-api-security</link>
	<author>Stephen Ringo</author>
	<guid>https://www.akamai.com/blog/security/2025/mar/enhancing-public-sector-cybersecurity-with-akamai-api-security</guid>
	<pubDate>Thu, 27 Mar 2025 19:00:00 UTC</pubDate>

</item>
<item>
	<title>To Meet Compliance Challenges, Focus on Building Great Security</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/mar/meet-compliance-challenges-focus-building-great-security</link>
	<author>Tony Lauro</author>
	<guid>https://www.akamai.com/blog/security/2025/mar/meet-compliance-challenges-focus-building-great-security</guid>
	<pubDate>Thu, 27 Mar 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>AI Inference on Akamai Cloud: Enabling Developers to Accelerate Edge Native Applications</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/mar/ai-inference-on-akamai-cloud</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/developers/2025/mar/ai-inference-on-akamai-cloud</guid>
	<pubDate>Thu, 27 Mar 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Emissions Transparency: Moving Toward a More Rigorous Verification</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2025/mar/moving-toward-a-more-rigorous-verification</link>
	<author>Katie Robinson</author>
	<guid>https://www.akamai.com/blog/sustainability/2025/mar/moving-toward-a-more-rigorous-verification</guid>
	<pubDate>Wed, 26 Mar 2025 12:00:00 UTC</pubDate>

</item>
<item>
	<title>Why AI Inference is Driving the Shift from Centralized to Distributed Cloud Computing</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/mar/why-ai-inference-is-driving-the-shift-from-centralized-to-distributed-cloud-computing</link>
	<author>Vineeth Varughese</author>
	<guid>https://www.akamai.com/blog/developers/2025/mar/why-ai-inference-is-driving-the-shift-from-centralized-to-distributed-cloud-computing</guid>
	<pubDate>Wed, 26 Mar 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Distributed Cloud Solutions and AI: Key Findings from Forrester's 2024 Study</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/mar/distributed-cloud-solutions-and-ai-key-findings-forrester</link>
	<author>Santiago Giraldo</author>
	<guid>https://www.akamai.com/blog/developers/2025/mar/distributed-cloud-solutions-and-ai-key-findings-forrester</guid>
	<pubDate>Tue, 25 Mar 2025 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Wins Best Sales Leadership Development Program from Brandon Hall</title>
	<description>Learn how Akamai's award-winning sales leadership development program transforms sales managers into impactful coaches, driving growth and performance.</description>
	<link>https://www.akamai.com/blog/news/2025/mar/akamai-wins-best-sales-leadership-brandon-hall</link>
	<author>Chelsey Pine</author>
	<guid>https://www.akamai.com/blog/news/2025/mar/akamai-wins-best-sales-leadership-brandon-hall</guid>
	<pubDate>Tue, 25 Mar 2025 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Channel-First Strategy: Driving Partner Success in 2025</title>
	<description>Customer success is Akamai’s priority — and our many industry awards highlight how we've empowered our partners to thrive. See what we have planned for 2025.</description>
	<link>https://www.akamai.com/blog/partners/2025/mar/akamais-channel-first-strategy-driving-partner-success-2025</link>
	<author>Janki Kaura</author>
	<guid>https://www.akamai.com/blog/partners/2025/mar/akamais-channel-first-strategy-driving-partner-success-2025</guid>
	<pubDate>Mon, 24 Mar 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Detecting and Mitigating an Authorization Bypass Vulnerability in Next.js</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/mar/march-authorization-bypass-critical-nextjs-detections-mitigations</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2025/mar/march-authorization-bypass-critical-nextjs-detections-mitigations</guid>
	<pubDate>Mon, 24 Mar 2025 08:00:00 UTC</pubDate>

</item>
<item>
	<title>Why AI Demands a New Security Playbook</title>
	<description>Understand the new AI security threats and how Akamai can help you develop a risk mitigation strategy.</description>
	<link>https://www.akamai.com/blog/security/2025/mar/why-ai-demands-a-new-security-playbook</link>
	<author>Rupesh Chokshi</author>
	<guid>https://www.akamai.com/blog/security/2025/mar/why-ai-demands-a-new-security-playbook</guid>
	<pubDate>Fri, 21 Mar 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Named a Leader in the Latest Forrester Report for WAF Solutions</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/mar/akamai-named-leader-latest-forrester-report-waf-solution</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/2025/mar/akamai-named-leader-latest-forrester-report-waf-solution</guid>
	<pubDate>Thu, 20 Mar 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>No Lag, All Frag: Level Up Your Gaming with Xonotic, K3s, and Edge Computing</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/mar/no-lag-all-frag</link>
	<author>Michael Archer</author>
	<guid>https://www.akamai.com/blog/developers/2025/mar/no-lag-all-frag</guid>
	<pubDate>Thu, 20 Mar 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Detecting and Mitigating Apache Tomcat CVE-2025-24813</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/mar/march-apache-tomcat-path-equivalence-traffic-detections-mitigations</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2025/mar/march-apache-tomcat-path-equivalence-traffic-detections-mitigations</guid>
	<pubDate>Thu, 20 Mar 2025 08:00:00 UTC</pubDate>

</item>
<item>
	<title>The Hidden Costs and Ethical Pitfalls of Content Scraping</title>
	<description>Read about the significant hidden costs and ethical pitfalls of content scraping — and learn how to protect your website.</description>
	<link>https://www.akamai.com/blog/security/2025/mar/the-hidden-costs-and-ethical-pitfalls-of-content-scraping</link>
	<author>Jagdish Mohite</author>
	<guid>https://www.akamai.com/blog/security/2025/mar/the-hidden-costs-and-ethical-pitfalls-of-content-scraping</guid>
	<pubDate>Wed, 19 Mar 2025 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Cryptominers’ Anatomy: Analyzing Cryptominers</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/mar/cryptominer-analyzing-samples-active-campaigns</link>
	<author>Maor Dahan</author>
	<guid>https://www.akamai.com/blog/security-research/2025/mar/cryptominer-analyzing-samples-active-campaigns</guid>
	<pubDate>Wed, 19 Mar 2025 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Negative Exposure: Edimax Network Cameras Used to Spread Mirai</title>
	<description>Mirai continues to plague organizations. Read how the Akamai SIRT identified a new command injection vulnerability that’s targeting Edimax devices.</description>
	<link>https://www.akamai.com/blog/security-research/2025/mar/march-edimax-cameras-command-injection-mirai</link>
	<author>Kyle Lefton &amp; Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security-research/2025/mar/march-edimax-cameras-command-injection-mirai</guid>
	<pubDate>Thu, 13 Mar 2025 19:00:00 UTC</pubDate>

</item>
<item>
	<title>Detecting and Mitigating the Apache Camel Vulnerabilities</title>
	<description>Akamai researchers have created detection scripts and additional details for the Apache Camel vulnerabilities CVE-2025-27636 and CVE-2025-29891.</description>
	<link>https://www.akamai.com/blog/security-research/2025/mar/march-apache-camel-vulnerability-detections-and-mitigations</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2025/mar/march-apache-camel-vulnerability-detections-and-mitigations</guid>
	<pubDate>Tue, 11 Mar 2025 16:00:00 UTC</pubDate>

</item>
<item>
	<title>From Good to Great: Mastering Day-2 Network Security Policy</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/mar/segmentation-network-security-policy-akamai-hunt</link>
	<author>Zohar Furman</author>
	<guid>https://www.akamai.com/blog/security/2025/mar/segmentation-network-security-policy-akamai-hunt</guid>
	<pubDate>Tue, 11 Mar 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Behind the Scenes: Introducing the Akamai Design System</title>
	<description>We recently made some design changes to our UI to improve the user experience. Lead Senior Software Engineer Jaalah Ramos expands on the “why” in this Q&amp;A.</description>
	<link>https://www.akamai.com/blog/developers/2025/mar/akamai-design-system-cloud-ui</link>
	<author>Maddie Presland</author>
	<guid>https://www.akamai.com/blog/developers/2025/mar/akamai-design-system-cloud-ui</guid>
	<pubDate>Mon, 10 Mar 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Magecart: How Akamai Protected a Global Retailer Against a Live Attack</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/mar/how-akamai-protected-global-retailer-against-live-attack</link>
	<author>Gal Meiri</author>
	<guid>https://www.akamai.com/blog/security/2025/mar/how-akamai-protected-global-retailer-against-live-attack</guid>
	<pubDate>Fri, 07 Mar 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Scale Transcoding and AI Workloads with GPU Kubernetes Clusters</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/mar/scale-transcoding-ai-workloads-gpu-kubernetes-clusters</link>
	<author>Hana Jeddy</author>
	<guid>https://www.akamai.com/blog/developers/2025/mar/scale-transcoding-ai-workloads-gpu-kubernetes-clusters</guid>
	<pubDate>Fri, 07 Mar 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Mastering Kubernetes: From Troubleshooting to Simplicity</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/mar/mastering-kubernetes-from-troubleshooting-to-simplicity</link>
	<author>Billy Thompson</author>
	<guid>https://www.akamai.com/blog/developers/2025/mar/mastering-kubernetes-from-troubleshooting-to-simplicity</guid>
	<pubDate>Tue, 04 Mar 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Why Are Airlines a Prime Target for Cyberattacks?</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/mar/why-are-airlines-prime-target-for-cyberattacks</link>
	<author>Jim Black &amp; Eric Rubenov</author>
	<guid>https://www.akamai.com/blog/security/2025/mar/why-are-airlines-prime-target-for-cyberattacks</guid>
	<pubDate>Tue, 04 Mar 2025 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Lightning-Fast Requests with Early Data</title>
	<description></description>
	<link>https://www.akamai.com/blog/edge/2025/feb/lightning-fast-requests-with-early-data</link>
	<author>Robin Marx &amp; Rafal Myszka</author>
	<guid>https://www.akamai.com/blog/edge/2025/feb/lightning-fast-requests-with-early-data</guid>
	<pubDate>Fri, 28 Feb 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Strengthening Our Emissions Accounting Process</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2025/feb/strengthening-our-emissions-accounting-process-blog</link>
	<author>Margot Hines</author>
	<guid>https://www.akamai.com/blog/sustainability/2025/feb/strengthening-our-emissions-accounting-process-blog</guid>
	<pubDate>Thu, 27 Feb 2025 18:00:00 UTC</pubDate>

</item>
<item>
	<title>PCI DSS v4.0.1: The Changes You Need to Know to Qualify for SAQ A</title>
	<description>What's changed in PCI DSS v4.0.1? Get a breakdown of what these new requirements mean and how Akamai’s solutions can help.</description>
	<link>https://www.akamai.com/blog/security/2025/feb/pci-dss-v4-0-1-changes-qualify-saq-a</link>
	<author>Mark Carrizosa , Boris Kirzner &amp; Emily Lyons</author>
	<guid>https://www.akamai.com/blog/security/2025/feb/pci-dss-v4-0-1-changes-qualify-saq-a</guid>
	<pubDate>Wed, 26 Feb 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Zero Trust Network Access Without the Performance Penalty</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/feb/zero-trust-network-access-without-performance-penalty</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/2025/feb/zero-trust-network-access-without-performance-penalty</guid>
	<pubDate>Wed, 26 Feb 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>DevOpsDays 2025</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/feb/devopsdays-2025</link>
	<author>Billy Thompson</author>
	<guid>https://www.akamai.com/blog/developers/2025/feb/devopsdays-2025</guid>
	<pubDate>Wed, 26 Feb 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Abusing VBS Enclaves to Create Evasive Malware</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/feb/abusing-vbs-enclaves-evasive-malware</link>
	<author>Ori David</author>
	<guid>https://www.akamai.com/blog/security-research/2025/feb/abusing-vbs-enclaves-evasive-malware</guid>
	<pubDate>Tue, 25 Feb 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Accelerate Your Business Success with Akamai Enhanced Partner Portal</title>
	<description></description>
	<link>https://www.akamai.com/blog/partners/2025/feb/accelerate-with-akamai-enhanced-partner-portal</link>
	<author>Marcello Scippa</author>
	<guid>https://www.akamai.com/blog/partners/2025/feb/accelerate-with-akamai-enhanced-partner-portal</guid>
	<pubDate>Thu, 20 Feb 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Deepseek: Why it Matters and What the Press Got Wrong</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/feb/deepseek-why-it-matters-and-what-the-press-got-wrong</link>
	<author>Robert Blumofe</author>
	<guid>https://www.akamai.com/blog/developers/2025/feb/deepseek-why-it-matters-and-what-the-press-got-wrong</guid>
	<pubDate>Wed, 19 Feb 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>How to Recognize AI Attacks and Strategies for Securing Your AI Applications</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/feb/attacks-and-strategies-for-securing-ai-applications</link>
	<author>Ziv Eli  &amp; Gal Meiri</author>
	<guid>https://www.akamai.com/blog/security/2025/feb/attacks-and-strategies-for-securing-ai-applications</guid>
	<pubDate>Wed, 19 Feb 2025 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Protect Your Critical Assets with Akamai Guardicore DNS Firewall</title>
	<description>Enhance your network security and protect servers, workloads, and IoT devices with Akamai Guardicore DNS Firewall. </description>
	<link>https://www.akamai.com/blog/security/2025/feb/protect-critical-assets-with-akamai-guardicore-dns-firewall</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/2025/feb/protect-critical-assets-with-akamai-guardicore-dns-firewall</guid>
	<pubDate>Tue, 18 Feb 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Introducing New  Akamai Object Storage Endpoints</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/feb/introducing-new-akamai-object-storage-endpoints</link>
	<author>Peter Sari (Peter Sari)</author>
	<guid>https://www.akamai.com/blog/developers/2025/feb/introducing-new-akamai-object-storage-endpoints</guid>
	<pubDate>Tue, 18 Feb 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Distributed AI Inferencing — The Next Generation of Computing</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/feb/distributed-ai-inferencing-next-generation-of-computing</link>
	<author>Vineeth Varughese</author>
	<guid>https://www.akamai.com/blog/cloud/2025/feb/distributed-ai-inferencing-next-generation-of-computing</guid>
	<pubDate>Thu, 13 Feb 2025 16:00:00 UTC</pubDate>

</item>
<item>
	<title>Managed Databases as Code Using Terraform</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/feb/managed-databases-as-code-using-terraform</link>
	<author>Peter Sari (Peter Sari)</author>
	<guid>https://www.akamai.com/blog/developers/2025/feb/managed-databases-as-code-using-terraform</guid>
	<pubDate>Thu, 13 Feb 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Introducing Akamai Managed Service for API Security</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/feb/introducing-akamai-managed-service-for-api-security</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2025/feb/introducing-akamai-managed-service-for-api-security</guid>
	<pubDate>Thu, 13 Feb 2025 08:00:00 UTC</pubDate>

</item>
<item>
	<title>Arming the Defenders: A SOTI Report for Those Who Protect the Enterprise</title>
	<description>Defenders, this one is for you. Read this SOTI report to get actionable insights from cybersecurity experts who battle cyberthreats every day.</description>
	<link>https://www.akamai.com/blog/security-research/2025/feb/arming-defenders-soti-report-for-protecting-enterprises</link>
	<author>Mitch Mayne</author>
	<guid>https://www.akamai.com/blog/security-research/2025/feb/arming-defenders-soti-report-for-protecting-enterprises</guid>
	<pubDate>Tue, 11 Feb 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Exploring a VPN Appliance: A Researcher’s Journey</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/feb/fortinet-critical-vulnerabilities</link>
	<author>Ben Barnea</author>
	<guid>https://www.akamai.com/blog/security-research/2025/feb/fortinet-critical-vulnerabilities</guid>
	<pubDate>Tue, 11 Feb 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Cryptominers’ Anatomy: Cryptomining Internals</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/feb/cryptominer-anatomy-internals</link>
	<author>Maor Dahan</author>
	<guid>https://www.akamai.com/blog/security-research/2025/feb/cryptominer-anatomy-internals</guid>
	<pubDate>Thu, 06 Feb 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Cache Hit Ratio: The Key Metric for Happier Users and Lower Expenses</title>
	<description></description>
	<link>https://www.akamai.com/blog/edge/2025/feb/the-key-metric-for-happier-users</link>
	<author>Mike Elissen</author>
	<guid>https://www.akamai.com/blog/edge/2025/feb/the-key-metric-for-happier-users</guid>
	<pubDate>Mon, 03 Feb 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Harnessing Artificial Intelligence for a Superior Web Application Firewall</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/feb/harnessing-artificial-intelligence-for-superior-web-application-firewall</link>
	<author>Maxim Zavodchik &amp; Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/2025/feb/harnessing-artificial-intelligence-for-superior-web-application-firewall</guid>
	<pubDate>Mon, 03 Feb 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Active Exploitation: New Aquabot Variant Phones Home</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2025/jan/new-aquabot-mirai-variant-exploiting-mitel-phones</link>
	<author>Kyle Lefton &amp; Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security-research/2025/jan/new-aquabot-mirai-variant-exploiting-mitel-phones</guid>
	<pubDate>Tue, 28 Jan 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Continuing the Sustainability Conversation</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2025/jan/continuing-the-sustainability-conversation</link>
	<author>Mike Mattera</author>
	<guid>https://www.akamai.com/blog/sustainability/2025/jan/continuing-the-sustainability-conversation</guid>
	<pubDate>Mon, 27 Jan 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Exploit Me, Baby, One More Time: Command Injection in Kubernetes Log Query</title>
	<description>A vulnerability in Kubernetes allows remote code execution. Read how abusing Log Query can lead to a complete takeover of  all Windows nodes in a cluster.</description>
	<link>https://www.akamai.com/blog/security-research/2025/jan/kubernetes-log-query-rce-windows</link>
	<author>Tomer Peled</author>
	<guid>https://www.akamai.com/blog/security-research/2025/jan/kubernetes-log-query-rce-windows</guid>
	<pubDate>Fri, 24 Jan 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>You Can’t Improve What You Can’t See: API Monitoring Is Crucial</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/jan/you-cant-improve-what-you-cant-see-api-monitoring-is-crucial</link>
	<author>Mayur Upadhyaya</author>
	<guid>https://www.akamai.com/blog/developers/2025/jan/you-cant-improve-what-you-cant-see-api-monitoring-is-crucial</guid>
	<pubDate>Tue, 21 Jan 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>DNS Silently Powers the Internet</title>
	<description>As a part of almost every internet transaction, the Domain Name System is powerful, lightweight, and ubiquitous — and delivers value for a modest investment.</description>
	<link>https://www.akamai.com/blog/security/2025/jan/dns-silently-powers-the-internet</link>
	<author>Bruce Van Nice</author>
	<guid>https://www.akamai.com/blog/security/2025/jan/dns-silently-powers-the-internet</guid>
	<pubDate>Fri, 17 Jan 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Named a Major Player in IDC MarketScape: Worldwide Public Cloud IaaS 2025 Assessment</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2025/jan/akamai-named-a-major-player-in-idc-marketscape</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/cloud/2025/jan/akamai-named-a-major-player-in-idc-marketscape</guid>
	<pubDate>Thu, 16 Jan 2025 17:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai API Security Release 3.41</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2025/jan/akamai-api-security-release-3-41</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2025/jan/akamai-api-security-release-3-41</guid>
	<pubDate>Thu, 16 Jan 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Tailored Approach to Net Zero</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2025/jan/akamai-tailored-approach-to-net-zero</link>
	<author>Mike Mattera</author>
	<guid>https://www.akamai.com/blog/sustainability/2025/jan/akamai-tailored-approach-to-net-zero</guid>
	<pubDate>Wed, 15 Jan 2025 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Live Streaming with Akamai’s Distributed Compute Regions</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/jan/live-streaming-with-akamais-distributed-compute-regions</link>
	<author>Nazir Kabani</author>
	<guid>https://www.akamai.com/blog/developers/2025/jan/live-streaming-with-akamais-distributed-compute-regions</guid>
	<pubDate>Wed, 15 Jan 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Object Storage Use Cases in Focus: New Endpoints for Higher Capacity and Speed</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/jan/object-storage-use-cases-in-focus-new-endpoints-for-higher-capacity-and-speed</link>
	<author>Peter Sari (Peter Sari)</author>
	<guid>https://www.akamai.com/blog/developers/2025/jan/object-storage-use-cases-in-focus-new-endpoints-for-higher-capacity-and-speed</guid>
	<pubDate>Tue, 14 Jan 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Data Security: Challenges, Solutions, and the Path Forward</title>
	<description>Learn why a more proactive, integrated, and dynamic approach to data security is crucial to effectively safeguard your business in today’s digital landscape.</description>
	<link>https://www.akamai.com/blog/security/2025/jan/data-security-challenges-solutions-and-the-path-forward</link>
	<author>Jagdish Mohite</author>
	<guid>https://www.akamai.com/blog/security/2025/jan/data-security-challenges-solutions-and-the-path-forward</guid>
	<pubDate>Wed, 08 Jan 2025 15:00:00 UTC</pubDate>

</item>
<item>
	<title>How Your Business Can Benefit From Combining a DAM and CDN</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2025/jan/how-your-business-can-benefit-from-combining-a-dam-and-cdn</link>
	<author>Jean-François Lecas</author>
	<guid>https://www.akamai.com/blog/developers/2025/jan/how-your-business-can-benefit-from-combining-a-dam-and-cdn</guid>
	<pubDate>Tue, 07 Jan 2025 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Making an Impact: Beach Cleanup and Reforestation Event</title>
	<description>Akamai volunteers in Costa Rica came together to remove trash from the beach and plant trees — and they learned how their everyday choices affect the planet.</description>
	<link>https://www.akamai.com/blog/sustainability/2025/jan/making-an-impact-beach-cleanup-and-reforestation-event</link>
	<author>brojas@akamai.com (Braulio Rojas)</author>
	<guid>https://www.akamai.com/blog/sustainability/2025/jan/making-an-impact-beach-cleanup-and-reforestation-event</guid>
	<pubDate>Mon, 06 Jan 2025 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Major Enhancements to Akamai API Security, Q4 2024 </title>
	<description>The Akamai API Security updates 3.38, 3.39, and 3.40 include configurable blocking, the automatic creation of posture findings from runtime incidents, and more.</description>
	<link>https://www.akamai.com/blog/security/2024/dec/major-enhancements-akamai-api-security-q4-2024</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2024/dec/major-enhancements-akamai-api-security-q4-2024</guid>
	<pubDate>Fri, 20 Dec 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Protecting Unmanaged Devices with Armis and Akamai</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/dec/protecting-unmanaged-devices-with-armis-and-akamai</link>
	<author>Jacob Abrams</author>
	<guid>https://www.akamai.com/blog/security/2024/dec/protecting-unmanaged-devices-with-armis-and-akamai</guid>
	<pubDate>Fri, 20 Dec 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>DigiEver Fix That IoT Thing!</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/dec/digiever-fix-that-iot-thing</link>
	<author>Kyle Lefton, Daniel Messing &amp; Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security-research/2024/dec/digiever-fix-that-iot-thing</guid>
	<pubDate>Thu, 19 Dec 2024 15:00:00 UTC</pubDate>

</item>
<item>
	<title>AVANT and Akamai: Solving Security Challenges for Financial Services</title>
	<description>Read why AVANT’s Trusted Advisors recommend to their clients Akamai’s award-winning solutions in cloud computing, cybersecurity, and application protection.</description>
	<link>https://www.akamai.com/blog/partners/2024/dec/avant-akamai-solving-security-challenges-financial-services</link>
	<author>Kathleen Moore</author>
	<guid>https://www.akamai.com/blog/partners/2024/dec/avant-akamai-solving-security-challenges-financial-services</guid>
	<pubDate>Thu, 19 Dec 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>The Benefits of Serverless Computing Architecture</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2024/dec/the-benefits-of-serverless-computing-architecture</link>
	<author>Mike Elissen</author>
	<guid>https://www.akamai.com/blog/cloud/2024/dec/the-benefits-of-serverless-computing-architecture</guid>
	<pubDate>Wed, 18 Dec 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Empowering Women in Cybersecurity: Lessons from the FS-ISAC Women’s Networking Event</title>
	<description>Discover strategies for empowering women in cybersecurity, gleaned from lessons learned at the 2024 FS-ISAC women’s networking event.</description>
	<link>https://www.akamai.com/blog/news/2024/dec/lessons-from-the-fs-isac-womens-networking-event</link>
	<author>Lisa Beegle</author>
	<guid>https://www.akamai.com/blog/news/2024/dec/lessons-from-the-fs-isac-womens-networking-event</guid>
	<pubDate>Tue, 17 Dec 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on December’s Patch Tuesday 2024</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/dec/akamai-perspective-patch-tuesday-december-2024</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2024/dec/akamai-perspective-patch-tuesday-december-2024</guid>
	<pubDate>Fri, 13 Dec 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Technical Academy and Coursera: A Year of STEM Education Success</title>
	<description></description>
	<link>https://www.akamai.com/blog/culture/2024/dec/a-year-of-stem-education-success</link>
	<author>Carrie Bergman, Jamie Ng &amp; Shirley Jiang</author>
	<guid>https://www.akamai.com/blog/culture/2024/dec/a-year-of-stem-education-success</guid>
	<pubDate>Fri, 13 Dec 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What To Do When You’re Under a DDoS Attack: A Guide to Action</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/dec/what-to-do-under-a-ddos-attack</link>
	<author>Sven Dummer &amp; Sandeep Rath</author>
	<guid>https://www.akamai.com/blog/security/2024/dec/what-to-do-under-a-ddos-attack</guid>
	<pubDate>Thu, 12 Dec 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Teaching an Old Framework New Tricks: The Dangers of Windows UI Automation</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/dec/windows-ui-automation-attack-technique-evades-edr</link>
	<author>Tomer Peled</author>
	<guid>https://www.akamai.com/blog/security-research/2024/dec/windows-ui-automation-attack-technique-evades-edr</guid>
	<pubDate>Wed, 11 Dec 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Supporting Cloud Growth in Japan: Tokyo Expansion</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/dec/tokyo-core-compute-region-expansion</link>
	<author>Maddie Presland</author>
	<guid>https://www.akamai.com/blog/developers/2024/dec/tokyo-core-compute-region-expansion</guid>
	<pubDate>Wed, 11 Dec 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Bot Reporting: 4 Key Differences to Consider</title>
	<description>Get a detailed look at Akamai’s bot reporting and the important advantages it offers to organizations that are looking to improve their bot defenses.</description>
	<link>https://www.akamai.com/blog/security/2024/dec/bot-reporting-4-key-differences-to-consider</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/2024/dec/bot-reporting-4-key-differences-to-consider</guid>
	<pubDate>Tue, 10 Dec 2024 17:00:00 UTC</pubDate>

</item>
<item>
	<title>What You Should Know About BreakingWAF</title>
	<description>BreakingWAF is not a vulnerability stemming from WAF solutions — it is a misconfiguration vulnerability that can be addressed during customer onboarding.</description>
	<link>https://www.akamai.com/blog/security-research/2024/dec/what-you-should-know-about-breakingwaf</link>
	<author>Akamai Security Research</author>
	<guid>https://www.akamai.com/blog/security-research/2024/dec/what-you-should-know-about-breakingwaf</guid>
	<pubDate>Tue, 10 Dec 2024 12:15:00 UTC</pubDate>

</item>
<item>
	<title>The Economic Impact of Akamai Guardicore Segmentation</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/nov/the-economic-impact-of-akamai-guardicore-segmentation</link>
	<author>Jacob Abrams</author>
	<guid>https://www.akamai.com/blog/security/2024/nov/the-economic-impact-of-akamai-guardicore-segmentation</guid>
	<pubDate>Mon, 09 Dec 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai IP Accelerator: A Holistic Approach to Security and Performance</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/dec/a-holistic-approach-to-security-and-performance</link>
	<author>Nitin Singla &amp; Sandra Murphy</author>
	<guid>https://www.akamai.com/blog/security/2024/dec/a-holistic-approach-to-security-and-performance</guid>
	<pubDate>Fri, 06 Dec 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How Holiday Season Traditions Affect Internet Traffic Trends</title>
	<description></description>
	<link>https://www.akamai.com/blog/edge/2024/dec/how-holiday-season-traditions-affect-internet-traffic-trends</link>
	<author>Josh Johnson</author>
	<guid>https://www.akamai.com/blog/edge/2024/dec/how-holiday-season-traditions-affect-internet-traffic-trends</guid>
	<pubDate>Thu, 05 Dec 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Pad Credit Card Info to Protect Customers' Wallets</title>
	<description>We take a look at a recently-assessed API, to see how it avoided the problem that helped the Allies beat the Axis powers in World War II.</description>
	<link>https://www.akamai.com/blog/developers/2024/dec/pad-credit-card-information-to-protect-your-customers-wallets</link>
	<author>Alex Leung</author>
	<guid>https://www.akamai.com/blog/developers/2024/dec/pad-credit-card-information-to-protect-your-customers-wallets</guid>
	<pubDate>Thu, 05 Dec 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Resilient by Design: Akamai’s Data-Driven Path to Climate Adaptation</title>
	<description> Learn how Akamai is using the challenges of climate change as opportunities for innovation and progress to weave climate resilience into our long-term strategy.</description>
	<link>https://www.akamai.com/blog/sustainability/2024/nov/resilient-by-design-akamais-data-driven-path-to-climate-adaptation</link>
	<author>Mike Mattera</author>
	<guid>https://www.akamai.com/blog/sustainability/2024/nov/resilient-by-design-akamais-data-driven-path-to-climate-adaptation</guid>
	<pubDate>Wed, 04 Dec 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>The Year in Review 2024: Today’s Insights, Tomorrow’s Outlook</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/dec/2024-december-today-insights-tomorrow-outlook-2025</link>
	<author>Mitch Mayne</author>
	<guid>https://www.akamai.com/blog/security-research/2024/dec/2024-december-today-insights-tomorrow-outlook-2025</guid>
	<pubDate>Tue, 03 Dec 2024 11:20:00 UTC</pubDate>

</item>
<item>
	<title>Just Right: New GPUs Now Available</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/dec/new-gpus-nvidia-rtx-4000-ada-generation</link>
	<author>Maddie Presland</author>
	<guid>https://www.akamai.com/blog/developers/2024/dec/new-gpus-nvidia-rtx-4000-ada-generation</guid>
	<pubDate>Tue, 03 Dec 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Battling the Emotional Toxicity Within Games: How to Digitally Thrive</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/oct/mental-health-and-financial-strain-hidden-costs-of-games</link>
	<author>Tricia Howard</author>
	<guid>https://www.akamai.com/blog/security-research/2024/oct/mental-health-and-financial-strain-hidden-costs-of-games</guid>
	<pubDate>Mon, 02 Dec 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>The Shift to the Edge Continues to Accelerate</title>
	<description>The IDC MarketScape report evaluated providers in the edge delivery services category. Read why Akamai was chosen as a Leader.</description>
	<link>https://www.akamai.com/blog/edge/2024/nov/the-shift-to-the-edge-continues-to-accelerate</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/edge/2024/nov/the-shift-to-the-edge-continues-to-accelerate</guid>
	<pubDate>Mon, 02 Dec 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: November 2024</title>
	<description>As the holiday season approaches and we bid farewell to another year, there’s no slowing down in developer content and releases.</description>
	<link>https://www.akamai.com/blog/developers/2024/nov/whats-new-for-developers-november-2024</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/2024/nov/whats-new-for-developers-november-2024</guid>
	<pubDate>Mon, 02 Dec 2024 11:20:00 UTC</pubDate>

</item>
<item>
	<title>Large Loss of Money? Choose Your LLM Security Solution Wisely. </title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/nov/llm-security-financial-impact</link>
	<author>Maxim Zavodchik, Alex Marks-Bluth &amp; Neeraj Pradeep</author>
	<guid>https://www.akamai.com/blog/security/2024/nov/llm-security-financial-impact</guid>
	<pubDate>Wed, 27 Nov 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Leads the Way in API Security:  GigaOm Radar for API Security Report</title>
	<description></description>
	<link>https://www.akamai.com/blog/news/2024/nov/akamai-leads-the-way-in-api-security-gigaom-radar</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/news/2024/nov/akamai-leads-the-way-in-api-security-gigaom-radar</guid>
	<pubDate>Wed, 27 Nov 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Frankfurt Expansion Now Available for All Customers</title>
	<description>Over the past year, Akamai’s core and distributed cloud architecture has grown significantly to better serve our customers requiring greater availability, lower latency, and more freedom of choice when it comes to how and where they run applications and workloads.</description>
	<link>https://www.akamai.com/blog/developers/2024/nov/frankfurt-core-compute-region-expansion</link>
	<author>Maddie Presland</author>
	<guid>https://www.akamai.com/blog/developers/2024/nov/frankfurt-core-compute-region-expansion</guid>
	<pubDate>Tue, 26 Nov 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Keep Your Tech Flame Alive: Akamai Trailblazer Agata Cupriak</title>
	<description></description>
	<link>https://www.akamai.com/blog/culture/2024/nov/keep-your-tech-flame-alive-agata-cupriak</link>
	<author>Akamai FLAME Team</author>
	<guid>https://www.akamai.com/blog/culture/2024/nov/keep-your-tech-flame-alive-agata-cupriak</guid>
	<pubDate>Tue, 26 Nov 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Experiencing Verge for the First Time</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2024/nov/experiencing-verge-for-the-first-time</link>
	<author>Owen Mattison</author>
	<guid>https://www.akamai.com/blog/sustainability/2024/nov/experiencing-verge-for-the-first-time</guid>
	<pubDate>Mon, 25 Nov 2024 07:00:00 UTC</pubDate>

</item>
<item>
	<title>The Secret to Reducing Compliance Risk in Financial Services: Visibility</title>
	<description>Enhanced visibility is key to managing compliance risk in financial services. Discover how a unified view can improve resilience, protect data, and build trust.</description>
	<link>https://www.akamai.com/blog/security/2024/nov/secret-to-reducing-compliance-risk-financial-services-visibility</link>
	<author>Steve Winterfeld</author>
	<guid>https://www.akamai.com/blog/security/2024/nov/secret-to-reducing-compliance-risk-financial-services-visibility</guid>
	<pubDate>Fri, 22 Nov 2024 20:00:00 UTC</pubDate>

</item>
<item>
	<title>Managing AI Bots as Part of Your Overall Bot Management Strategy</title>
	<description>Learn about the potential impacts of AI bots and the importance of having a holistic bot management strategy.</description>
	<link>https://www.akamai.com/blog/security/2024/nov/managing-ai-bots-part-overall-bot-management-strategy</link>
	<author>Ilia Bromberg &amp; Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/2024/nov/managing-ai-bots-part-overall-bot-management-strategy</guid>
	<pubDate>Wed, 20 Nov 2024 20:00:00 UTC</pubDate>

</item>
<item>
	<title>Segmenting Hybrid Clouds: What to Look for in a Solution</title>
	<description>Learn how to select a microsegmentation solution to fortify your organization’s cloud security strategies and protect your assets across multiple public clouds.</description>
	<link>https://www.akamai.com/blog/security/2024/nov/segmenting-hybrid-clouds-what-to-look-for-in-solution</link>
	<author>Jacob Abrams</author>
	<guid>https://www.akamai.com/blog/security/2024/nov/segmenting-hybrid-clouds-what-to-look-for-in-solution</guid>
	<pubDate>Tue, 19 Nov 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Everything You Need to Know About Edge Networks</title>
	<description></description>
	<link>https://www.akamai.com/blog/edge/2024/nov/everything-you-need-to-know-about-edge-networks</link>
	<author>Mike Elissen</author>
	<guid>https://www.akamai.com/blog/edge/2024/nov/everything-you-need-to-know-about-edge-networks</guid>
	<pubDate>Tue, 19 Nov 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>More Power at the Edge: Introducing Distributed Compute Regions</title>
	<description>For edge-native applications, performance is closely tied to the location of cloud services.</description>
	<link>https://www.akamai.com/blog/developers/2024/nov/introducing-distributed-compute-regions</link>
	<author>Maddie Presland</author>
	<guid>https://www.akamai.com/blog/developers/2024/nov/introducing-distributed-compute-regions</guid>
	<pubDate>Mon, 18 Nov 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Five Ways to Prevent and Protect Against Ransomware Attacks</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/nov/five-ways-to-protect-against-ransomware-attacks</link>
	<author>Jacob Abrams</author>
	<guid>https://www.akamai.com/blog/security/2024/nov/five-ways-to-protect-against-ransomware-attacks</guid>
	<pubDate>Mon, 18 Nov 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on November’s Patch Tuesday 2024</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/nov/akamai-perspective-patch-tuesday-november-2024</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2024/nov/akamai-perspective-patch-tuesday-november-2024</guid>
	<pubDate>Fri, 15 Nov 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Managed Database Services: Powered by Aiven</title>
	<description>Akamai has partnered with Aiven, a leading global managed database provider, to offer customers a streamlined way to offload the complexities of database setup, configuration, patching, backups, and scaling.</description>
	<link>https://www.akamai.com/blog/developers/2024/nov/akamai-managed-database-services-powered-by-aiven</link>
	<author>Peter Sari (Peter Sari)</author>
	<guid>https://www.akamai.com/blog/developers/2024/nov/akamai-managed-database-services-powered-by-aiven</guid>
	<pubDate>Thu, 14 Nov 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>The Definitive Guide to Linux Process Injection</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/nov/the-definitive-guide-to-linux-process-injection</link>
	<author>Ori David</author>
	<guid>https://www.akamai.com/blog/security-research/2024/nov/the-definitive-guide-to-linux-process-injection</guid>
	<pubDate>Thu, 14 Nov 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Study Reveals Security Teams Feel the Impact of Rising API Threats</title>
	<description>API abuse is increasing at an alarming rate. Read this post to learn the four areas of focus for organizations that are seeking to protect their APIs.</description>
	<link>https://www.akamai.com/blog/security/2024/nov/study-reveals-security-teams-feel-impact-rising-api-threats</link>
	<author>Rupesh Chokshi</author>
	<guid>https://www.akamai.com/blog/security/2024/nov/study-reveals-security-teams-feel-impact-rising-api-threats</guid>
	<pubDate>Wed, 13 Nov 2024 11:30:00 UTC</pubDate>

</item>
<item>
	<title>Getting Started with Akamai App Platform</title>
	<description>Step-by-step instructions to provision a Kubernetes cluster with Akamai App Platform enabled and then build, deploy and publicly expose an application.</description>
	<link>https://www.akamai.com/blog/developers/2024/nov/getting-started-with-akamai-app-platform</link>
	<author>Sander Rodenhuis (Sander Rodenhuis)</author>
	<guid>https://www.akamai.com/blog/developers/2024/nov/getting-started-with-akamai-app-platform</guid>
	<pubDate>Wed, 13 Nov 2024 11:20:00 UTC</pubDate>

</item>
<item>
	<title>Introducing the Akamai App Platform</title>
	<description>Over the past decade, developers have been forced to choose between two evils: either accept Big Cloud’s complexity, costs, and lock-in, or struggle and lose precious time building everything from scratch. Like code itself, it was a binary decision.</description>
	<link>https://www.akamai.com/blog/developers/2024/nov/introducing-the-akamai-app-platform</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/developers/2024/nov/introducing-the-akamai-app-platform</guid>
	<pubDate>Tue, 12 Nov 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Finding Solutions to Meet PCI DSS v4.0 Requirements 6.4.3 and 11.6.1</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/nov/meet-pci-dss-v40-requirements</link>
	<author>Boris Kirzner</author>
	<guid>https://www.akamai.com/blog/security/2024/nov/meet-pci-dss-v40-requirements</guid>
	<pubDate>Fri, 08 Nov 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai's Behavioral DDoS Engine: A Breakthrough in Modern DDoS Mitigation</title>
	<description>As digital infrastructure grows, so do the threats posed by DDoS attacks. See how the Akamai Behavioral DDoS Engine can keep your business online.</description>
	<link>https://www.akamai.com/blog/security/2024/nov/akamais-behavioral-ddos-engine-breakthrough-in-modern-ddos-mitigation</link>
	<author>Aseem Ahmed &amp; Abdeslam Bella</author>
	<guid>https://www.akamai.com/blog/security/2024/nov/akamais-behavioral-ddos-engine-breakthrough-in-modern-ddos-mitigation</guid>
	<pubDate>Thu, 07 Nov 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Rails Without Derails: Thwarting Code Injection Attacks</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/oct/ruby-on-rails-waf-code-injection-protection</link>
	<author>Sam Tinklenberg, Maxim Zavodchik &amp; Aparna Mandal</author>
	<guid>https://www.akamai.com/blog/security/2024/oct/ruby-on-rails-waf-code-injection-protection</guid>
	<pubDate>Wed, 06 Nov 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Exploring Artificial Intelligence: Is AI Overhyped?</title>
	<description>Dive into AI technologies like inference, deep learning, and generative models to learn how LLMs and AI are transforming cybersecurity and tech industries.</description>
	<link>https://www.akamai.com/blog/security/2024/nov/exploring-artificial-intelligence-is-ai-overhyped</link>
	<author>Berk Veral</author>
	<guid>https://www.akamai.com/blog/security/2024/nov/exploring-artificial-intelligence-is-ai-overhyped</guid>
	<pubDate>Mon, 04 Nov 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>How Ransomware Is Delivered and How to Prevent Attacks</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/nov/how-ransomware-is-delivered-prevent-attacks</link>
	<author>Jacob Abrams</author>
	<guid>https://www.akamai.com/blog/security/2024/nov/how-ransomware-is-delivered-prevent-attacks</guid>
	<pubDate>Fri, 01 Nov 2024 07:00:00 UTC</pubDate>

</item>
<item>
	<title>In the Dark about Shadow APIs?</title>
	<description>I’m often asked about shadow APIs and shadow API parameters—even by people with a lot of experience in the API development space.</description>
	<link>https://www.akamai.com/blog/developers/2024/oct/in-the-dark-about-shadow-apis</link>
	<author>Alex Leung</author>
	<guid>https://www.akamai.com/blog/developers/2024/oct/in-the-dark-about-shadow-apis</guid>
	<pubDate>Thu, 31 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>6 Steps for Cyber Resilience During the 2024 U.S. Presidential Election</title>
	<description> Learn about the risks to service availability during the 2024 U.S. presidential election — and the six steps you can take now to ensure your cyber resilience.</description>
	<link>https://www.akamai.com/blog/security/2024/oct/6-steps-cyber-resilience-during-2024-us-presidential-election</link>
	<author>Ryan Gao</author>
	<guid>https://www.akamai.com/blog/security/2024/oct/6-steps-cyber-resilience-during-2024-us-presidential-election</guid>
	<pubDate>Wed, 30 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Beyond the Login — Keeping Accounts Secure with Lifecycle Protection</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/oct/keeping-accounts-secure-with-lifecycle-protection</link>
	<author>Emily Lyons</author>
	<guid>https://www.akamai.com/blog/security/2024/oct/keeping-accounts-secure-with-lifecycle-protection</guid>
	<pubDate>Tue, 29 Oct 2024 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Bad Bots: 6 Common Bot Attacks and Why They Happen</title>
	<description>Learn about the different types of bot attacks, why they happen, and how to protect your website from these threats with effective bot mitigation strategies.</description>
	<link>https://www.akamai.com/blog/security/2024/oct/bad-bots-6-common-bot-attacks-and-why-they-happen</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/2024/oct/bad-bots-6-common-bot-attacks-and-why-they-happen</guid>
	<pubDate>Mon, 28 Oct 2024 11:00:00 UTC</pubDate>

</item>
<item>
	<title>Scrub EXIF Image Data in Your DevOps Pipeline</title>
	<description>In this post, we’ll go over why you need to scrub EXIF image data and how to integrate this process into your DevOps pipeline.</description>
	<link>https://www.akamai.com/blog/developers/2024/oct/scrub-exif-image-data-in-your-devops-pipeline</link>
	<author>Alex Leung</author>
	<guid>https://www.akamai.com/blog/developers/2024/oct/scrub-exif-image-data-in-your-devops-pipeline</guid>
	<pubDate>Thu, 24 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Improve SEO with Prerender.io</title>
	<description>In this post, we’ll look at how prerendering services from Prerender.io can help you overcome SEO obstacles when using these frameworks.</description>
	<link>https://www.akamai.com/blog/developers/2024/oct/improve-seo-with-prerender-io</link>
	<author>Tim Vereecke</author>
	<guid>https://www.akamai.com/blog/developers/2024/oct/improve-seo-with-prerender-io</guid>
	<pubDate>Tue, 22 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Loose Lips Can Sink Websites Too</title>
	<description>When we think about keeping websites safe, we often imagine complex firewalls, multi-layered defenses, and robust encryption.</description>
	<link>https://www.akamai.com/blog/developers/2024/oct/loose-lips-can-sink-websites-too</link>
	<author>Alex Leung</author>
	<guid>https://www.akamai.com/blog/developers/2024/oct/loose-lips-can-sink-websites-too</guid>
	<pubDate>Mon, 21 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How In-Person Meetings Fast-Tracked Our vPPA Negotiations in Europe</title>
	<description>In-person interactions can build trust, foster collaboration, and achieve efficiency — especially for complex negotiations — even in the post-pandemic world.</description>
	<link>https://www.akamai.com/blog/sustainability/2024/oct/how-in-person-meetings-fast-tracked-vppa-negotiations-europe</link>
	<author>Mike Mattera</author>
	<guid>https://www.akamai.com/blog/sustainability/2024/oct/how-in-person-meetings-fast-tracked-vppa-negotiations-europe</guid>
	<pubDate>Mon, 21 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Call and Register — Relay Attack on WinReg RPC Client</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/oct/winreg-relay-vulnerability</link>
	<author>Stiv Kupchik</author>
	<guid>https://www.akamai.com/blog/security-research/2024/oct/winreg-relay-vulnerability</guid>
	<pubDate>Sat, 19 Oct 2024 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Pay Attention to Your Non-Production Subdomains</title>
	<description>It’s common for security teams to focus their best efforts on an organization’s primary production domain. </description>
	<link>https://www.akamai.com/blog/developers/2024/oct/pay-attention-to-your-non-production-subdomains</link>
	<author>Alex Leung</author>
	<guid>https://www.akamai.com/blog/developers/2024/oct/pay-attention-to-your-non-production-subdomains</guid>
	<pubDate>Thu, 17 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Why Modern Layer 7 DDoS Protections Are Crucial for Web Security in 2024</title>
	<description>A new Akamai white paper explains why you need to prioritize modern Layer 7 DDoS protection — and details how you can guide your security efforts.</description>
	<link>https://www.akamai.com/blog/security/2024/oct/why-modern-layer-7-ddos-protections-crucial-web-security-2024</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/2024/oct/why-modern-layer-7-ddos-protections-crucial-web-security-2024</guid>
	<pubDate>Thu, 17 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Simplify Security and Enhance WAAP with Detection and Control in the AI Era</title>
	<description>Simplify operations without sacrificing control. Read how Akamai delivers a robust defense with innovations like Behavioral DDoS Engine and AI Assistant.</description>
	<link>https://www.akamai.com/blog/security/2024/oct/simplify-security-enhance-waap-with-detection-control-ai-era</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/2024/oct/simplify-security-enhance-waap-with-detection-control-ai-era</guid>
	<pubDate>Wed, 16 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: October 2024</title>
	<description>In addition to several articles that help you keep your applications and websites safe, we’re sharing news on the latest Akamai PowerShell release, instructions for building a NAT Gateway in a VPC, new docs for migrating to Linode Object Storage, and more.</description>
	<link>https://www.akamai.com/blog/developers/2024/oct/whats-new-for-developers-october-2024</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/2024/oct/whats-new-for-developers-october-2024</guid>
	<pubDate>Wed, 16 Oct 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Anonymous Sudan Takedown: Akamai's Role</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/oct/anonymous-sudan-takedown-akamai-role-ddos</link>
	<author>Akamai SIRT</author>
	<guid>https://www.akamai.com/blog/security-research/2024/oct/anonymous-sudan-takedown-akamai-role-ddos</guid>
	<pubDate>Wed, 16 Oct 2024 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on October’s Patch Tuesday 2024</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/oct/akamai-perspective-patch-tuesday-october-2024</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2024/oct/akamai-perspective-patch-tuesday-october-2024</guid>
	<pubDate>Fri, 11 Oct 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>In-memory Data Management Caching Tools: A Guide to the Best Options</title>
	<description>In-memory data management caching tools store frequently accessed data in memory, which significantly improves performance by reducing how often the database needs to be accessed.</description>
	<link>https://www.akamai.com/blog/developers/2024/oct/in-memory-data-management-caching-tools-a-guide-to-the-best-options</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/developers/2024/oct/in-memory-data-management-caching-tools-a-guide-to-the-best-options</guid>
	<pubDate>Thu, 10 Oct 2024 19:00:00 UTC</pubDate>

</item>
<item>
	<title>How Americaneagle.com Thwarted a Massive DNS DDoS Attack with Akamai Shield NS53</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/oct/american-eagle-thwarted-massive-dns-ddos-attack</link>
	<author>Sandeep Rath</author>
	<guid>https://www.akamai.com/blog/security/2024/oct/american-eagle-thwarted-massive-dns-ddos-attack</guid>
	<pubDate>Thu, 10 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Beyond the Edge: Complementing WAAP with Always-On API Security</title>
	<description>Learn best practices for API security — and explore why WAAP on its own isn’t enough</description>
	<link>https://www.akamai.com/blog/security/2024/oct/beyond-edge-complementing-waap-always-on-api-security</link>
	<author>Edward Roberts</author>
	<guid>https://www.akamai.com/blog/security/2024/oct/beyond-edge-complementing-waap-always-on-api-security</guid>
	<pubDate>Thu, 10 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Strengthening DOD Cybersecurity: The Journey to Zero Trust by 2027</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/aug/strengthening-dod-cybersecurity-the-journey-to-zero-trust-by-2027</link>
	<author>Dayna Jackson</author>
	<guid>https://www.akamai.com/blog/security/2024/aug/strengthening-dod-cybersecurity-the-journey-to-zero-trust-by-2027</guid>
	<pubDate>Wed, 09 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Migrating from Client-Side to Server-Side Adaptive Bitrate Streaming</title>
	<description>Streaming platforms scale to accommodate millions of concurrent viewers across diverse devices and network conditions, making efficient adaptive bitrate (ABR) streaming essential. </description>
	<link>https://www.akamai.com/blog/developers/2024/oct/migrating-from-client-side-to-server-side-adaptive-bitrate-streaming</link>
	<author>Talia Nassi</author>
	<guid>https://www.akamai.com/blog/developers/2024/oct/migrating-from-client-side-to-server-side-adaptive-bitrate-streaming</guid>
	<pubDate>Tue, 08 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Use ITSM, SIEM, and SOAR to Remediate API Attacks</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/oct/how-to-use-itsm-siem-and-soar-to-remediate-api-attacks</link>
	<author>John Natale</author>
	<guid>https://www.akamai.com/blog/security/2024/oct/how-to-use-itsm-siem-and-soar-to-remediate-api-attacks</guid>
	<pubDate>Tue, 08 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai: Supporting Chinese Enterprises in Global Expansion</title>
	<description>China is a cornerstone of Akamai’s operations and we view ourselves as partners with Chinese businesses as they navigate the complexities of a global economy.</description>
	<link>https://www.akamai.com/blog/news/2025/jan/akamai-supporting-chinese-enterprises-global-expansion</link>
	<author>Sean Li</author>
	<guid>https://www.akamai.com/blog/news/2025/jan/akamai-supporting-chinese-enterprises-global-expansion</guid>
	<pubDate>Fri, 04 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Cutting Latency, Not Security</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/oct/cutting-latency-not-security</link>
	<author>Philip McGuinness</author>
	<guid>https://www.akamai.com/blog/developers/2024/oct/cutting-latency-not-security</guid>
	<pubDate>Thu, 03 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Increased Capacity in Asia: Mumbai and Singapore Expansions Now Available</title>
	<description>We’re continuing to expand our cloud computing footprint and capacity with both new core compute regions and expansions of popular regions. </description>
	<link>https://www.akamai.com/blog/developers/2024/oct/asia-core-compute-region-expansions-singapore-mumbai</link>
	<author>Maddie Presland</author>
	<guid>https://www.akamai.com/blog/developers/2024/oct/asia-core-compute-region-expansions-singapore-mumbai</guid>
	<pubDate>Thu, 03 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Why Fuzzing Isn’t Enough to Test Your APIs for Security Issues</title>
	<description>Learn about API testing best practices and find out why fuzzing has limitations for enterprises that need API security.</description>
	<link>https://www.akamai.com/blog/security/2024/oct/why-fuzzing-isnt-enough-to-test-your-apis-for-security-issues</link>
	<author>John Natale</author>
	<guid>https://www.akamai.com/blog/security/2024/oct/why-fuzzing-isnt-enough-to-test-your-apis-for-security-issues</guid>
	<pubDate>Thu, 03 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Kubernetes the Hard Way</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/oct/kubernetes-the-hard-way</link>
	<author>Jorge Gaona</author>
	<guid>https://www.akamai.com/blog/developers/2024/oct/kubernetes-the-hard-way</guid>
	<pubDate>Wed, 02 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Advancing Federal Cybersecurity With Zero Trust Principles</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/oct/advancing-federal-cybersecurity-with-zero-trust-principles</link>
	<author>Dayna Jackson</author>
	<guid>https://www.akamai.com/blog/security/2024/oct/advancing-federal-cybersecurity-with-zero-trust-principles</guid>
	<pubDate>Wed, 02 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Introducing an Effortless Way to Deploy Akamai API Security</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/oct/introducing-effortless-way-deploy-akamai-api-security</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2024/oct/introducing-effortless-way-deploy-akamai-api-security</guid>
	<pubDate>Tue, 01 Oct 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>When CUPS Runneth Over: The Threat of DDoS</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/oct/october-cups-ddos-threat</link>
	<author>Larry Cashdollar, Kyle Lefton &amp; Chad Seaman</author>
	<guid>https://www.akamai.com/blog/security-research/2024/oct/october-cups-ddos-threat</guid>
	<pubDate>Tue, 01 Oct 2024 11:00:00 UTC</pubDate>

</item>
<item>
	<title>Our New Carbon Calculator Report Supports 400 Days of Data</title>
	<description>The new Carbon Calculator is supported by the latest reporting API framework, improves performance, and allows customers to monitor up to 400 days of data.</description>
	<link>https://www.akamai.com/blog/sustainability/2024/sep/new-carbon-calculator-report-supports-400-days-data</link>
	<author>Sudipta Roy</author>
	<guid>https://www.akamai.com/blog/sustainability/2024/sep/new-carbon-calculator-report-supports-400-days-data</guid>
	<pubDate>Mon, 30 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Too Good To Be True? For True Value, Look Beyond Vendors’ Sales Claims</title>
	<description></description>
	<link>https://www.akamai.com/blog/performance/2024/sep/look-beyond-vendors-sales-claims</link>
	<author>Mimi An</author>
	<guid>https://www.akamai.com/blog/performance/2024/sep/look-beyond-vendors-sales-claims</guid>
	<pubDate>Fri, 27 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Keep Your Tech Flame Alive: Akamai Trailblazer Sabine A. Sitterli</title>
	<description></description>
	<link>https://www.akamai.com/blog/culture/2024/sep/keep-your-tech-flame-alive-akamai-trailblazer-sabine-sitterli</link>
	<author>Akamai FLAME Team</author>
	<guid>https://www.akamai.com/blog/culture/2024/sep/keep-your-tech-flame-alive-akamai-trailblazer-sabine-sitterli</guid>
	<pubDate>Thu, 26 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>End-to-End Security for APIs: From Development Through Retirement</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/sep/end-to-end-security-for-apis-from-development-through-retirement</link>
	<author>Steven Duckaert</author>
	<guid>https://www.akamai.com/blog/security/2024/sep/end-to-end-security-for-apis-from-development-through-retirement</guid>
	<pubDate>Thu, 26 Sep 2024 11:00:00 UTC</pubDate>

</item>
<item>
	<title>Enterprise Data Ingestion with Low Latency: Akamai's Proven Solutions for Financial Institutions</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/sep/enterprise-data-ingestion-with-low-latency-akamais-proven-solutions-for-financial-institutions</link>
	<author>Talia Nassi</author>
	<guid>https://www.akamai.com/blog/developers/2024/sep/enterprise-data-ingestion-with-low-latency-akamais-proven-solutions-for-financial-institutions</guid>
	<pubDate>Wed, 25 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Optimizing Web Usability with Text Fragments</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/sep/optimizing-web-usability-with-text-fragments</link>
	<author>Linode (Linode)</author>
	<guid>https://www.akamai.com/blog/developers/2024/sep/optimizing-web-usability-with-text-fragments</guid>
	<pubDate>Tue, 24 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: September 2024</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/sep/whats-new-for-developers-september-2024</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/2024/sep/whats-new-for-developers-september-2024</guid>
	<pubDate>Fri, 20 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Maximizing Financial Performance: How Financial Institutions Can Achieve Low Latency and High Throughput with NATS.io and Akamai</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/sep/maximizing-financial-performance-how-financial-institutions-can-achieve-low-latency-and-high-throughput-with-nats-io-and-akamai</link>
	<author>Talia Nassi</author>
	<guid>https://www.akamai.com/blog/developers/2024/sep/maximizing-financial-performance-how-financial-institutions-can-achieve-low-latency-and-high-throughput-with-nats-io-and-akamai</guid>
	<pubDate>Thu, 19 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Migrate Your Ecommerce Web Hosting Stack From OpenStack to Linode</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/sep/how-to-migrate-your-ecommerce-web-hosting-stack-from-openstack-to-linode</link>
	<author>Talia Nassi</author>
	<guid>https://www.akamai.com/blog/developers/2024/sep/how-to-migrate-your-ecommerce-web-hosting-stack-from-openstack-to-linode</guid>
	<pubDate>Wed, 18 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Pointless May Not Be Harmless: The Story of a Login Page with a Blank Security Question</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/sep/pointless-may-not-be-harmless-login-page-security-vulnerabilities</link>
	<author>Alex Leung</author>
	<guid>https://www.akamai.com/blog/developers/2024/sep/pointless-may-not-be-harmless-login-page-security-vulnerabilities</guid>
	<pubDate>Tue, 17 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Beware the Rising Tide: Financial Services Is Awash in Attacks</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/sep/financial-services-is-awash-in-attacks</link>
	<author>Mitch Mayne</author>
	<guid>https://www.akamai.com/blog/security-research/2024/sep/financial-services-is-awash-in-attacks</guid>
	<pubDate>Tue, 17 Sep 2024 10:30:00 UTC</pubDate>

</item>
<item>
	<title>Modernizing Enterprise Security for An Application-Centric World</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/sep/modernizing-enterprise-security-application-centric-world</link>
	<author>Mani Sundaram</author>
	<guid>https://www.akamai.com/blog/security/2024/sep/modernizing-enterprise-security-application-centric-world</guid>
	<pubDate>Mon, 16 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on September’s Patch Tuesday 2024</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/sep/akamai-perspective-patch-tuesday-september-2024</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2024/sep/akamai-perspective-patch-tuesday-september-2024</guid>
	<pubDate>Fri, 13 Sep 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Prevents DDoS Attack on Major U.S. Customer</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/sep/akamai-prevents-record-breaking-ddos-attack-major-us-customer</link>
	<author>Sandeep Rath &amp; Craig Sparling</author>
	<guid>https://www.akamai.com/blog/security/2024/sep/akamai-prevents-record-breaking-ddos-attack-major-us-customer</guid>
	<pubDate>Fri, 13 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How Distributed Cloud Computing Meets Modern User Demand</title>
	<description>Learn why distributed cloud computing is essential to meet user demand for highly customized, secure services.</description>
	<link>https://www.akamai.com/blog/cloud/2024/sep/how-distributed-cloud-computing-meets-modern-user-demand</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/cloud/2024/sep/how-distributed-cloud-computing-meets-modern-user-demand</guid>
	<pubDate>Thu, 12 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How Distributed Cloud Computing Meets Modern User Demand</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/sep/how-distributed-cloud-computing-meets-modern-user-demand</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/developers/2024/sep/how-distributed-cloud-computing-meets-modern-user-demand</guid>
	<pubDate>Thu, 12 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Build a NAT Gateway in a VPC with Linode</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/sep/how-to-build-a-nat-gateway-in-a-vpc-with-linode</link>
	<author>Talia Nassi</author>
	<guid>https://www.akamai.com/blog/developers/2024/sep/how-to-build-a-nat-gateway-in-a-vpc-with-linode</guid>
	<pubDate>Thu, 12 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Security in Your DevOps Pipeline</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/sep/security-in-your-devops-pipeline</link>
	<author>Alex Leung</author>
	<guid>https://www.akamai.com/blog/developers/2024/sep/security-in-your-devops-pipeline</guid>
	<pubDate>Tue, 10 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Detect Suspicious API Traffic</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/sep/how-to-detect-suspicious-api-traffic</link>
	<author>John Natale</author>
	<guid>https://www.akamai.com/blog/security/2024/sep/how-to-detect-suspicious-api-traffic</guid>
	<pubDate>Tue, 10 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Reduce API Sprawl with API Discovery</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/sep/reduce-api-sprawl-with-api-discovery</link>
	<author>John Natale</author>
	<guid>https://www.akamai.com/blog/security/2024/sep/reduce-api-sprawl-with-api-discovery</guid>
	<pubDate>Mon, 09 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>5 Reasons Why You Need API Discovery</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/aug/5-reasons-why-you-need-api-discovery</link>
	<author>John Natale</author>
	<guid>https://www.akamai.com/blog/security/2024/aug/5-reasons-why-you-need-api-discovery</guid>
	<pubDate>Thu, 05 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Future-Proofing Legacy Media Workflows with Akamai Object Storage</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/sep/future-proofing-legacy-media-workflows-with-akamai-object-storage</link>
	<author>Peter Sari (Peter Sari)</author>
	<guid>https://www.akamai.com/blog/developers/2024/sep/future-proofing-legacy-media-workflows-with-akamai-object-storage</guid>
	<pubDate>Wed, 04 Sep 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>How to Implement Zero Trust on a Budget</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/sep/implement-zero-trust-on-a-budget</link>
	<author>Dayna Jackson</author>
	<guid>https://www.akamai.com/blog/security/2024/sep/implement-zero-trust-on-a-budget</guid>
	<pubDate>Tue, 03 Sep 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Dangers of the Never-Expiring JWT: Hidden Security Vulnerabilities</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/sep/the-dangers-of-the-never-expiring-jwt</link>
	<author>Alex Leung</author>
	<guid>https://www.akamai.com/blog/developers/2024/sep/the-dangers-of-the-never-expiring-jwt</guid>
	<pubDate>Tue, 03 Sep 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Best Practices to Help Meet PCI DSS v4.0 API Security Compliance</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/aug/meet-pci-dss-v40-api-security-compliance</link>
	<author>John Natale</author>
	<guid>https://www.akamai.com/blog/security/2024/aug/meet-pci-dss-v40-api-security-compliance</guid>
	<pubDate>Fri, 30 Aug 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Inside the NIST Cybersecurity Framework 2.0 and API Security</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/aug/nist-cybersecurity-framework-and-api-security</link>
	<author>Anurag Anuj</author>
	<guid>https://www.akamai.com/blog/security/2024/aug/nist-cybersecurity-framework-and-api-security</guid>
	<pubDate>Thu, 29 Aug 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Leverage Edge Computing for Low-Latency Live Streaming Services</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/aug/leverage-edge-computing-for-low-latency-live-streaming-services</link>
	<author>Talia Nassi</author>
	<guid>https://www.akamai.com/blog/developers/2024/aug/leverage-edge-computing-for-low-latency-live-streaming-services</guid>
	<pubDate>Thu, 29 Aug 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Announcing Couchbase Enterprise Server Cluster on Our One-Click App Marketplace</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/aug/announcing-couchbase-enterprise-server-cluster-on-our-one-click-app-marketplace</link>
	<author>Travis Baka</author>
	<guid>https://www.akamai.com/blog/developers/2024/aug/announcing-couchbase-enterprise-server-cluster-on-our-one-click-app-marketplace</guid>
	<pubDate>Wed, 28 Aug 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Named a Leader in The Forrester Wave™: Microsegmentation Solutions, Q3 2024</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/aug/2024-akamai-named-a-leader-in-the-forrester-wave</link>
	<author>Ravit Greitser</author>
	<guid>https://www.akamai.com/blog/security/2024/aug/2024-akamai-named-a-leader-in-the-forrester-wave</guid>
	<pubDate>Wed, 28 Aug 2024 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Beware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Day</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/aug/corona-mirai-botnet-infects-zero-day-sirt</link>
	<author>Kyle Lefton, Larry Cashdollar &amp; Aline Eliovich</author>
	<guid>https://www.akamai.com/blog/security-research/2024/aug/corona-mirai-botnet-infects-zero-day-sirt</guid>
	<pubDate>Wed, 28 Aug 2024 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Faster Page Loads with the Speculation Rules API</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/aug/faster-page-loads-with-the-speculation-rules-api</link>
	<author>Tim Vereecke</author>
	<guid>https://www.akamai.com/blog/developers/2024/aug/faster-page-loads-with-the-speculation-rules-api</guid>
	<pubDate>Tue, 27 Aug 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>How Securing APIs Factors into DORA Compliance</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/aug/how-securing-apis-factors-into-dora-compliance</link>
	<author>John Natale</author>
	<guid>https://www.akamai.com/blog/security/2024/aug/how-securing-apis-factors-into-dora-compliance</guid>
	<pubDate>Thu, 22 Aug 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>New Core Compute Regions: London Expansion and Melbourne Are Live</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/aug/new-core-compute-regions-london-expansion-and-melbourne-are-live</link>
	<author>Maddie Presland</author>
	<guid>https://www.akamai.com/blog/developers/2024/aug/new-core-compute-regions-london-expansion-and-melbourne-are-live</guid>
	<pubDate>Thu, 22 Aug 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Embed API Security into Regulatory Compliance: Six Examples to Watch</title>
	<description>Read about how to meet API-related requirements in six key regulations and frameworks to better protect your organization.</description>
	<link>https://www.akamai.com/blog/security/2024/aug/embed-api-security-into-regulatory-compliance-six-examples</link>
	<author>John Natale</author>
	<guid>https://www.akamai.com/blog/security/2024/aug/embed-api-security-into-regulatory-compliance-six-examples</guid>
	<pubDate>Wed, 21 Aug 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Edge Computing and 5G: Emerging Technology Shaping the Future of IT</title>
	<description>Learn how and why enterprise businesses are using edge computing and 5G to deliver better digital experiences for their customers.</description>
	<link>https://www.akamai.com/blog/edge/2024/aug/edge-computing-5g-emerging-technology-shaping-future-it</link>
	<author>Santiago Giraldo</author>
	<guid>https://www.akamai.com/blog/edge/2024/aug/edge-computing-5g-emerging-technology-shaping-future-it</guid>
	<pubDate>Tue, 20 Aug 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Defend Your GraphQL Server Against Excessive Resource Consumption</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/aug/defend-your-graphql-server-against-excessive-resource-consumption</link>
	<author>Alex Leung</author>
	<guid>https://www.akamai.com/blog/developers/2024/aug/defend-your-graphql-server-against-excessive-resource-consumption</guid>
	<pubDate>Tue, 20 Aug 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>How We Transformed Akamai from a CDN to a Cloud and Security Company</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/aug/transformed-akamai-cdn-cloud-security-company</link>
	<author>Tom Leighton</author>
	<guid>https://www.akamai.com/blog/security/2024/aug/transformed-akamai-cdn-cloud-security-company</guid>
	<pubDate>Mon, 19 Aug 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Environmental Management System Meets the ISO 14001 Standard</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2024/aug/akamais-environmental-management-system-meets-iso-14001-standard</link>
	<author>Katie Robinson</author>
	<guid>https://www.akamai.com/blog/sustainability/2024/aug/akamais-environmental-management-system-meets-iso-14001-standard</guid>
	<pubDate>Mon, 19 Aug 2024 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on August’s Patch Tuesday 2024</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/aug/akamai-perspective-patch-tuesday-august-2024</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2024/aug/akamai-perspective-patch-tuesday-august-2024</guid>
	<pubDate>Fri, 16 Aug 2024 05:00:00 UTC</pubDate>

</item>
<item>
	<title>The Noname Security 3.34 Update Includes Major Enhancements</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/aug/the-noname-security-3-34-update</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2024/aug/the-noname-security-3-34-update</guid>
	<pubDate>Thu, 15 Aug 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>How To Lower Your Live Video Transcoding Costs</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/aug/how-to-lower-your-live-video-transcoding-costs</link>
	<author>Talia Nassi</author>
	<guid>https://www.akamai.com/blog/developers/2024/aug/how-to-lower-your-live-video-transcoding-costs</guid>
	<pubDate>Thu, 15 Aug 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Guardicore Platform: Microsegmentation Just Got a Whole Lot Better</title>
	<description>Akamai introduces new microsegmentation features to the Akamai Guardicore Platform to help organizations further refine their security posture.</description>
	<link>https://www.akamai.com/blog/security/2024/aug/akamai-guardicore-platform-microsegmentation-just-got-whole-lot-better</link>
	<author>Maya Luisan</author>
	<guid>https://www.akamai.com/blog/security/2024/aug/akamai-guardicore-platform-microsegmentation-just-got-whole-lot-better</guid>
	<pubDate>Wed, 14 Aug 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: August 2024</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/aug/whats-new-for-developers-august-2024</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/2024/aug/whats-new-for-developers-august-2024</guid>
	<pubDate>Wed, 14 Aug 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Defending Against a Login API Brute Force Attack</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/aug/defending-against-a-login-api-brute-force-attack</link>
	<author>Alex Leung</author>
	<guid>https://www.akamai.com/blog/developers/2024/aug/defending-against-a-login-api-brute-force-attack</guid>
	<pubDate>Tue, 13 Aug 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Taking Steps to Prepare for Quantum Advantage</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/aug/taking-steps-to-prepare-for-quantum-advantage</link>
	<author> Rich Salz &amp; Jan Schaumann</author>
	<guid>https://www.akamai.com/blog/security/2024/aug/taking-steps-to-prepare-for-quantum-advantage</guid>
	<pubDate>Mon, 12 Aug 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Git-Syncing into Trouble: Exploring Command Injection Flaws in Kubernetes</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/aug/kubernetes-gitsync-command-injection-defcon</link>
	<author>Tomer Peled</author>
	<guid>https://www.akamai.com/blog/security-research/2024/aug/kubernetes-gitsync-command-injection-defcon</guid>
	<pubDate>Fri, 09 Aug 2024 11:00:00 UTC</pubDate>

</item>
<item>
	<title>Gaining Control Over Sky-High Cloud Costs: Our Journey So Far</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/aug/project-cirrus-gaining-control-over-sky-high-cloud-costs</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/developers/2024/aug/project-cirrus-gaining-control-over-sky-high-cloud-costs</guid>
	<pubDate>Fri, 09 Aug 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Improving Apache httpd Protections Proactively with Orange Tsai of DEVCORE</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/aug/apache-waf-proactive-collaboration-orange-tsai-devcore</link>
	<author>Ryan Barnett &amp; Sam Tinklenberg</author>
	<guid>https://www.akamai.com/blog/security-research/2024/aug/apache-waf-proactive-collaboration-orange-tsai-devcore</guid>
	<pubDate>Thu, 08 Aug 2024 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Cloning Content to Linode Object Storage with RClone</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/aug/cloning-content-to-linode-object-storage-with-rclone</link>
	<author>smacleod@akamai.com (Stuart Macleod)</author>
	<guid>https://www.akamai.com/blog/developers/2024/aug/cloning-content-to-linode-object-storage-with-rclone</guid>
	<pubDate>Thu, 08 Aug 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Living off the VPN — Exploring VPN Post-Exploitation Techniques</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/aug/vpn-post-exploitation-techniques-black-hat</link>
	<author>Ori David</author>
	<guid>https://www.akamai.com/blog/security-research/2024/aug/vpn-post-exploitation-techniques-black-hat</guid>
	<pubDate>Wed, 07 Aug 2024 17:20:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Blocked 419 TB of Malicious Traffic in a 24-Hour DDoS Attack</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/aug/akamai-blocked-419-tb-of-malicious-traffic</link>
	<author>Sven Dummer</author>
	<guid>https://www.akamai.com/blog/security/2024/aug/akamai-blocked-419-tb-of-malicious-traffic</guid>
	<pubDate>Wed, 07 Aug 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>What Is an Event-Driven Microservices Architecture?</title>
	<description></description>
	<link>https://www.akamai.com/blog/edge/2024/aug/what-is-an-event-driven-microservices-architecture</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/edge/2024/aug/what-is-an-event-driven-microservices-architecture</guid>
	<pubDate>Tue, 06 Aug 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>It’s a New World: APIs Protected by the Power of N</title>
	<description>The world of APIs is changing fast — as is what it takes to secure them. Our new Power of N campaign explains why.</description>
	<link>https://www.akamai.com/blog/security/2024/aug/apis-protected-by-the-power-of-n</link>
	<author>Stacey Sweeney</author>
	<guid>https://www.akamai.com/blog/security/2024/aug/apis-protected-by-the-power-of-n</guid>
	<pubDate>Mon, 05 Aug 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Strategic and Transparent Implementation of AI</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/aug/akamai-strategic-and-transparent-implementation-of-ai</link>
	<author>Berk Veral</author>
	<guid>https://www.akamai.com/blog/security/2024/aug/akamai-strategic-and-transparent-implementation-of-ai</guid>
	<pubDate>Thu, 01 Aug 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Take Cover: Securing Games Truly Is a Battle Royale</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/jul/games-security-trends-is-a-battle-royale</link>
	<author>Tricia Howard</author>
	<guid>https://www.akamai.com/blog/security-research/2024/jul/games-security-trends-is-a-battle-royale</guid>
	<pubDate>Wed, 31 Jul 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Why (and How) APIs and Web Applications Are Under Siege</title>
	<description>Read a summary of the latest SOTI report, which tackles the security risks in web applications and APIs, and the infrastructure that powers them</description>
	<link>https://www.akamai.com/blog/security-research/why-and-how-apis-web-applications-are-under-siege</link>
	<author>Mitch Mayne</author>
	<guid>https://www.akamai.com/blog/security-research/why-and-how-apis-web-applications-are-under-siege</guid>
	<pubDate>Tue, 30 Jul 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Keep Your Tech Flame Alive: Akamai Trailblazer Elizabeth Padley</title>
	<description>In this Akamai FLAME Trailblazer blog, Elizabeth Padley tells us that as an international employment lawyer in tech, she has learned to expect the unexpected.</description>
	<link>https://www.akamai.com/blog/culture/2024/jul/keep-your-tech-flame-alive-akamai-trailblazer-elizabeth-padley</link>
	<author>Akamai FLAME Team</author>
	<guid>https://www.akamai.com/blog/culture/2024/jul/keep-your-tech-flame-alive-akamai-trailblazer-elizabeth-padley</guid>
	<pubDate>Mon, 29 Jul 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Planting Trees in India: Green Team #GenerationRestoration</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2024/jul/planting-trees-in-india-green-team</link>
	<author>Ayisha Mohammed</author>
	<guid>https://www.akamai.com/blog/sustainability/2024/jul/planting-trees-in-india-green-team</guid>
	<pubDate>Fri, 26 Jul 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Analyzing Malicious CrowdStrike Domains: Who Is Affected and What Could Come Next</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/jul/crowdstrike-bsod-domains-what-could-come-next</link>
	<author>Akamai Enterprise Security Group SecOps</author>
	<guid>https://www.akamai.com/blog/security-research/2024/jul/crowdstrike-bsod-domains-what-could-come-next</guid>
	<pubDate>Fri, 26 Jul 2024 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Early Hints: A New Way for Improving User Experience and Core Web Vitals</title>
	<description></description>
	<link>https://www.akamai.com/blog/performance/2024/jul/akamai-early-hints-improving-user-experience</link>
	<author>Debayan Roy</author>
	<guid>https://www.akamai.com/blog/performance/2024/jul/akamai-early-hints-improving-user-experience</guid>
	<pubDate>Fri, 19 Jul 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: July 2024</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/jul/developer-update-july-2024</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/2024/jul/developer-update-july-2024</guid>
	<pubDate>Fri, 19 Jul 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>PCI DSS v4.0.1: Meeting New Client-Side Security Requirements</title>
	<description>Learn how Akamai Client-Side Protection &amp; Compliance helps organizations meet the latest payment security updates and clarifications outlined in PCI DSS v4.0.1.</description>
	<link>https://www.akamai.com/blog/security/2024/jul/pci-dss-v401-meeting-new-client-side-security-requirements</link>
	<author>Boris Kirzner</author>
	<guid>https://www.akamai.com/blog/security/2024/jul/pci-dss-v401-meeting-new-client-side-security-requirements</guid>
	<pubDate>Tue, 16 Jul 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Securing APIs While Navigating Today’s Booming API Economy</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/jul/securing-apis-while-navigating-todays-booming-api-economy</link>
	<author>Jagdish Mohite</author>
	<guid>https://www.akamai.com/blog/security/2024/jul/securing-apis-while-navigating-todays-booming-api-economy</guid>
	<pubDate>Mon, 15 Jul 2024 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on July’s Patch Tuesday 2024</title>
	<description>Patches are raining down like Independence Day fireworks. July 2024’s Patch Tuesday has 137 total CVEs and one vulnerability found in the wild.</description>
	<link>https://www.akamai.com/blog/security-research/2024/jul/akamai-perspective-on-july-patch-tuesday-2024</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2024/jul/akamai-perspective-on-july-patch-tuesday-2024</guid>
	<pubDate>Thu, 11 Jul 2024 19:00:00 UTC</pubDate>

</item>
<item>
	<title>6 Tips for a Successful Security Vendor Consolidation</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/jul/6-tips-successful-security-vendor-consolidation</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/2024/jul/6-tips-successful-security-vendor-consolidation</guid>
	<pubDate>Thu, 11 Jul 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>CVE-2024-4577 Exploits in the Wild One Day After Disclosure</title>
	<description>Akamai researchers have observed numerous exploit attempts for the PHP vulnerability CVE-2024-4577 as early as one day after disclosure.</description>
	<link>https://www.akamai.com/blog/security-research/2024/jul/2024-php-exploit-cve-one-day-after-disclosure</link>
	<author>Kyle Lefton, Allen West &amp; Sam Tinklenberg</author>
	<guid>https://www.akamai.com/blog/security-research/2024/jul/2024-php-exploit-cve-one-day-after-disclosure</guid>
	<pubDate>Wed, 10 Jul 2024 19:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Launches Early Hints to Further Boost User Experience and SEO</title>
	<description></description>
	<link>https://www.akamai.com/blog/performance/2023/oct/akamai-103-early-hints-prototype-the-results-are-in</link>
	<author>Tim Vereecke, Robin Marx &amp; Debayan Roy</author>
	<guid>https://www.akamai.com/blog/performance/2023/oct/akamai-103-early-hints-prototype-the-results-are-in</guid>
	<pubDate>Tue, 09 Jul 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Lower Video Transcoding Costs with Dedicated Linode Instances</title>
	<description>Discover how to slash video transcoding costs by 33% with dedicated compute instances and learn effective strategies to reduce egress fees and optimize VM utilization</description>
	<link>https://www.akamai.com/blog/developers/2024/jul/how-to-lower-video-transcoding-costs-by-migrating-to-dedicated-linode-instances</link>
	<author>Talia Nassi</author>
	<guid>https://www.akamai.com/blog/developers/2024/jul/how-to-lower-video-transcoding-costs-by-migrating-to-dedicated-linode-instances</guid>
	<pubDate>Tue, 09 Jul 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Defend Against Account Abuse in Financial Services</title>
	<description>Learn how Akamai Account Protector defends against account abuse by distinguishing between legitimate and malicious activities.</description>
	<link>https://www.akamai.com/blog/security/2024/jun/defend-against-account-abuse-in-financial-services</link>
	<author>Emily Lyons &amp; Ryan Gao</author>
	<guid>https://www.akamai.com/blog/security/2024/jun/defend-against-account-abuse-in-financial-services</guid>
	<pubDate>Mon, 08 Jul 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Guidance on the Critical OpenSSH Vulnerability regreSSHion</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/jul/openssh-vulnerability-regression-what-to-know-and-do</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2024/jul/openssh-vulnerability-regression-what-to-know-and-do</guid>
	<pubDate>Wed, 03 Jul 2024 17:00:00 UTC</pubDate>

</item>
<item>
	<title>Sustainability and ESG: Understanding the Difference and Why It Matters</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2024/jul/sustainability-and-esg-understanding-the-difference</link>
	<author>Navya Lakkaraju</author>
	<guid>https://www.akamai.com/blog/sustainability/2024/jul/sustainability-and-esg-understanding-the-difference</guid>
	<pubDate>Wed, 03 Jul 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Information on OpenSSH "regreSSHion" Vulnerability</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/jul/information-on-openssh-regresshion-vulnerability</link>
	<author>Linode (Linode)</author>
	<guid>https://www.akamai.com/blog/developers/2024/jul/information-on-openssh-regresshion-vulnerability</guid>
	<pubDate>Wed, 03 Jul 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Zero Trust Is Revolutionizing API Security in Financial Services</title>
	<description>Learn how a Zero Trust approach transforms API security in financial services by ensuring innovation, efficiency, and customer trust amid evolving cyberthreats.</description>
	<link>https://www.akamai.com/blog/security/2024/jun/zero-trust-revolutionizing-api-security-financial-services</link>
	<author>Cheryl Chiodi</author>
	<guid>https://www.akamai.com/blog/security/2024/jun/zero-trust-revolutionizing-api-security-financial-services</guid>
	<pubDate>Tue, 02 Jul 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Examining the Polyfill Attack from Akamai's Point of View</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/jul/polyfill-supply-chain-attack-what-to-know</link>
	<author>Gal Meiri</author>
	<guid>https://www.akamai.com/blog/security/2024/jul/polyfill-supply-chain-attack-what-to-know</guid>
	<pubDate>Tue, 02 Jul 2024 09:00:00 UTC</pubDate>

</item>
<item>
	<title>Social Media Monitoring and Rogue App Detection in Akamai Brand Guardian</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/jul/social-media-monitoring-and-rogue-app-detection</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/2024/jul/social-media-monitoring-and-rogue-app-detection</guid>
	<pubDate>Mon, 01 Jul 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How TrafficPeak Helped Provide a Superior Football Viewing Experience</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2024/jun/trafficpeak-helped-provide-superior-football-viewing-experience</link>
	<author>Nathan Hoffmann</author>
	<guid>https://www.akamai.com/blog/cloud/2024/jun/trafficpeak-helped-provide-superior-football-viewing-experience</guid>
	<pubDate>Fri, 28 Jun 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Celebrating a Year of Innovation with Akamai Brand Guardian</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/jun/year-of-innovation-with-akamai-brand-protector</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/2024/jun/year-of-innovation-with-akamai-brand-protector</guid>
	<pubDate>Thu, 27 Jun 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Companies Optimize Cloud Costs and Deliver Superior Experiences on Akamai</title>
	<description>Learn how Akamai’s customers optimize their cloud computing costs and deliver engaging customer experiences with our open and affordable cloud infrastructure.</description>
	<link>https://www.akamai.com/blog/cloud/2024/jun/companies-optimize-cloud-costs-deliver-superior-experiences-on-akamai</link>
	<author>Rick Myers</author>
	<guid>https://www.akamai.com/blog/cloud/2024/jun/companies-optimize-cloud-costs-deliver-superior-experiences-on-akamai</guid>
	<pubDate>Wed, 26 Jun 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Keep Your Tech Flame Alive: Trailblazer Mie Elmkvist Schneider</title>
	<description>In this Akamai FLAME Trailblazer blog post, Mie Elmkvist Schneider from Queue-it describes the differences between being a manager and being a leader.</description>
	<link>https://www.akamai.com/blog/culture/2024/jun/keep-your-tech-flame-alive-trailblazer-mie-elmkvist-schneider</link>
	<author>Akamai FLAME Team</author>
	<guid>https://www.akamai.com/blog/culture/2024/jun/keep-your-tech-flame-alive-trailblazer-mie-elmkvist-schneider</guid>
	<pubDate>Wed, 26 Jun 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s That Scraping Sound? How Web Scraper Bots Erode Ecommerce Profits</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/jun/commerce-soti-web-scraper-bots</link>
	<author>Mitch Mayne</author>
	<guid>https://www.akamai.com/blog/security-research/2024/jun/commerce-soti-web-scraper-bots</guid>
	<pubDate>Tue, 25 Jun 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Doubles Down on API Security</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/jun/akamai-doubles-down-on-api-security</link>
	<author>Michael Kleef</author>
	<guid>https://www.akamai.com/blog/security/2024/jun/akamai-doubles-down-on-api-security</guid>
	<pubDate>Tue, 25 Jun 2024 11:00:00 UTC</pubDate>

</item>
<item>
	<title>Women in Tech: Remain Open to Unexpected Opportunities</title>
	<description>Akamai CIO Kate Prouty explores the benefits of remaining open to new opportunities and salutes the bond among women in tech.</description>
	<link>https://www.akamai.com/blog/culture/2024/jun/women-in-tech-remain-open-unexpected-opportunities</link>
	<author>Tashema Nichols-Jones</author>
	<guid>https://www.akamai.com/blog/culture/2024/jun/women-in-tech-remain-open-unexpected-opportunities</guid>
	<pubDate>Mon, 24 Jun 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on June’s Patch Tuesday 2024</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/jun/akamai-perspective-patch-tuesday-june-2024</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2024/jun/akamai-perspective-patch-tuesday-june-2024</guid>
	<pubDate>Fri, 14 Jun 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>How Healthcare Providers Should Think About Balancing Innovation Efforts with Cybersecurity Goals</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/healthcare-providers-balancing-innovation-efforts-with-cybersecurity-goals</link>
	<author>Steve Winterfeld</author>
	<guid>https://www.akamai.com/blog/security-research/healthcare-providers-balancing-innovation-efforts-with-cybersecurity-goals</guid>
	<pubDate>Fri, 14 Jun 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>9 Malware Types Enterprise Professionals Need to Know</title>
	<description>Learn about nine malware types so that you can take steps to protect your enterprise business and your customers from cyberattackers.</description>
	<link>https://www.akamai.com/blog/security/2024/jun/9-malware-types-enterprise-professionals-need-to-know</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/2024/jun/9-malware-types-enterprise-professionals-need-to-know</guid>
	<pubDate>Thu, 06 Jun 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>2024: Old CVEs, New Targets — Active Exploitation of ThinkPHP</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/jun/2024-thinkphp-applications-exploit-1-days-dama-webshell</link>
	<author>Ron Mankivsky &amp; Maxim Zavodchik</author>
	<guid>https://www.akamai.com/blog/security-research/2024/jun/2024-thinkphp-applications-exploit-1-days-dama-webshell</guid>
	<pubDate>Wed, 05 Jun 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Celebrates Earth Day with a Cleanup of Rio Agres</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2024/jun/akamai-celebrates-earth-day-cleanup-rio-agres</link>
	<author>brojas@akamai.com (Braulio Rojas)</author>
	<guid>https://www.akamai.com/blog/sustainability/2024/jun/akamai-celebrates-earth-day-cleanup-rio-agres</guid>
	<pubDate>Wed, 05 Jun 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>It’s Getting Hot in Here: EMEA SOTI</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/jun/emea-soti-ddos-trends-dns-legislation-finserv</link>
	<author>Tricia Howard</author>
	<guid>https://www.akamai.com/blog/security-research/2024/jun/emea-soti-ddos-trends-dns-legislation-finserv</guid>
	<pubDate>Tue, 04 Jun 2024 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Running CloudTest on Akamai Cloud Computing</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2024/jun/running-cloudtest-on-akamai-cloud-computing</link>
	<author>Hitoshi Kaneko</author>
	<guid>https://www.akamai.com/blog/cloud/2024/jun/running-cloudtest-on-akamai-cloud-computing</guid>
	<pubDate>Mon, 03 Jun 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Edge Computing Versus Cloud Computing: Key Similarities and Differences</title>
	<description>Explore the use cases, similarities, and differences of edge computing and cloud computing.</description>
	<link>https://www.akamai.com/blog/edge/2024/may/edge-computing-versus-cloud-computing-key-similarities-differences</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/edge/2024/may/edge-computing-versus-cloud-computing-key-similarities-differences</guid>
	<pubDate>Fri, 31 May 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/may/2024-redtail-cryptominer-pan-os-cve-exploit</link>
	<author>Ryan Barnett, Stiv Kupchik &amp; Maxim Zavodchik</author>
	<guid>https://www.akamai.com/blog/security-research/2024/may/2024-redtail-cryptominer-pan-os-cve-exploit</guid>
	<pubDate>Thu, 30 May 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Protect and Elevate Your DNS with Akamai Shield NS53</title>
	<description>Learn how Akamai Shield NS53 can protect your capital investment into on-premises DNS infrastructure and significantly improve performance.</description>
	<link>https://www.akamai.com/blog/security/2024/may/protect-and-elevate-your-dns-with-akamai-shield-ns53</link>
	<author>Sam Preston</author>
	<guid>https://www.akamai.com/blog/security/2024/may/protect-and-elevate-your-dns-with-akamai-shield-ns53</guid>
	<pubDate>Wed, 29 May 2024 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Cut Costs by Migrating from EFS to Object Storage</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/may/cut-costs-by-migrating-to-object-storage</link>
	<author>Linode (Linode)</author>
	<guid>https://www.akamai.com/blog/developers/2024/may/cut-costs-by-migrating-to-object-storage</guid>
	<pubDate>Tue, 28 May 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Have Web Trust Issues? Bot Management Can Help</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/may/how-bot-management-can-help</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/2024/may/how-bot-management-can-help</guid>
	<pubDate>Wed, 22 May 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Why Game Companies Are Adopting Distributed Cloud Computing</title>
	<description>Global game developers are providing improved performance, better in-game experiences, and boosting gamer retention with distributed cloud computing.</description>
	<link>https://www.akamai.com/blog/cloud/2024/may/game-companies-are-adopting-distributed-cloud-computing</link>
	<author>Cheng Xi</author>
	<guid>https://www.akamai.com/blog/cloud/2024/may/game-companies-are-adopting-distributed-cloud-computing</guid>
	<pubDate>Tue, 21 May 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Defend Against Relentless DNS Attacks</title>
	<description>Enterprise organizations, their employees, and their customers are better protected from cyberattacks when their DNS is properly secured.</description>
	<link>https://www.akamai.com/blog/security/battling-dns-fatigue-defend-against-relentless-attacks</link>
	<author>Steve Winterfeld &amp; Jim Gilbert</author>
	<guid>https://www.akamai.com/blog/security/battling-dns-fatigue-defend-against-relentless-attacks</guid>
	<pubDate>Mon, 20 May 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Why Insurers Need Visibility Into APIs Risks</title>
	<description>Learn the importance of API discovery, inventory, and risk assessment for insurance companies, and read two examples of why API security is a team sport.</description>
	<link>https://www.akamai.com/blog/security/2024/sep/why-insurers-need-visibility-into-apis-risks</link>
	<author>Andre Kerstens</author>
	<guid>https://www.akamai.com/blog/security/2024/sep/why-insurers-need-visibility-into-apis-risks</guid>
	<pubDate>Mon, 20 May 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Adds Support for Kubernetes Cluster API</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/may/akamai-adds-support-for-kubernetes-cluster-api</link>
	<author>Linode (Linode)</author>
	<guid>https://www.akamai.com/blog/developers/2024/may/akamai-adds-support-for-kubernetes-cluster-api</guid>
	<pubDate>Mon, 20 May 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on May’s Patch Tuesday 2024</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/may/akamai-perspective-patch-tuesday-may-2024</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2024/may/akamai-perspective-patch-tuesday-may-2024</guid>
	<pubDate>Fri, 17 May 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>DDoS Attacks Against Life Sciences Organizations Likely to Rise</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/rising-ddos-attacks-against-life-sciences-organizations</link>
	<author>Carley Thornell</author>
	<guid>https://www.akamai.com/blog/security-research/rising-ddos-attacks-against-life-sciences-organizations</guid>
	<pubDate>Fri, 17 May 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Why SaaS Companies Are Adopting Distributed Cloud Computing</title>
	<description>A study commissioned by Akamai included asking more than 250 global SaaS developers about their perceptions of distributed cloud. Their answers may surprise you.</description>
	<link>https://www.akamai.com/blog/cloud/2024/may/saas-companies-adopting-distributed-cloud-computing</link>
	<author>Anders Näsman</author>
	<guid>https://www.akamai.com/blog/cloud/2024/may/saas-companies-adopting-distributed-cloud-computing</guid>
	<pubDate>Tue, 14 May 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Recognized as a Customers’ Choice for Cloud WAAP for the 5th Year</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/may/akamai-recognized-customers-choice-cloud-waap-5th-year</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/2024/may/akamai-recognized-customers-choice-cloud-waap-5th-year</guid>
	<pubDate>Wed, 08 May 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Accelerating Zero Trust Outcomes with Generative AI, Part 2: Guardicore AI</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/may/accelerating-zero-trust-outcomes-with-generative-ai-part-2</link>
	<author>Jacob Abrams</author>
	<guid>https://www.akamai.com/blog/security/2024/may/accelerating-zero-trust-outcomes-with-generative-ai-part-2</guid>
	<pubDate>Tue, 07 May 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How Effectively Are You Deploying Segmentation to Mitigate Cyberattack Risks?</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/may/effectively-deploying-segmentation-to-mitigate-cyberattack-risks</link>
	<author>Carley Thornell, Cheryl Chiodi, Susan McReynolds &amp; Helder Ferrão</author>
	<guid>https://www.akamai.com/blog/security/2024/may/effectively-deploying-segmentation-to-mitigate-cyberattack-risks</guid>
	<pubDate>Tue, 07 May 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Accelerating Zero Trust Outcomes with Generative AI, Part 1: AI Labeling</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/may/accelerating-zero-trust-outcomes-with-generative-ai-part-1</link>
	<author>Jacob Abrams</author>
	<guid>https://www.akamai.com/blog/security/2024/may/accelerating-zero-trust-outcomes-with-generative-ai-part-1</guid>
	<pubDate>Mon, 06 May 2024 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Healthcare Needs To Be Laser-Focused on API Security and Its Blind Spots </title>
	<description>API-powered tools can enhance patient access to healthcare services, but these tools also introduce risk. Learn how to protect your organization.</description>
	<link>https://www.akamai.com/blog/security/2024/apr/healthcare-laser-focused-api-security-blind-spots</link>
	<author>Carley Thornell</author>
	<guid>https://www.akamai.com/blog/security/2024/apr/healthcare-laser-focused-api-security-blind-spots</guid>
	<pubDate>Fri, 03 May 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Noname Security Platform Updates: 3.30 Release</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-330-release</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-330-release</guid>
	<pubDate>Thu, 02 May 2024 18:01:00 UTC</pubDate>

</item>
<item>
	<title>Using Our Environmental Management System to Create a Sustainable Future</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2024/may/environmental-management-system-to-create-a-sustainable-future</link>
	<author>Katie Robinson</author>
	<guid>https://www.akamai.com/blog/sustainability/2024/may/environmental-management-system-to-create-a-sustainable-future</guid>
	<pubDate>Thu, 02 May 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Crucial Role of Data in Sustainability</title>
	<description>Akamai’s data has the potential to help us address one of the most significant challenges of our time: climate change.</description>
	<link>https://www.akamai.com/blog/sustainability/2024/apr/crucial-role-data-sustainability</link>
	<author>Mike Mattera</author>
	<guid>https://www.akamai.com/blog/sustainability/2024/apr/crucial-role-data-sustainability</guid>
	<pubDate>Wed, 01 May 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>5 Steps to Make Zero Trust Achievable</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/apr/5-steps-to-make-zero-trust-achievable</link>
	<author>Dan Petrillo</author>
	<guid>https://www.akamai.com/blog/security/2024/apr/5-steps-to-make-zero-trust-achievable</guid>
	<pubDate>Tue, 30 Apr 2024 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Think Beyond the Perimeter: Secure Your APIs with East-West Visibility</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/apr/secure-your-apis-with-east-west-visibility</link>
	<author>Abigail Ojeda &amp; Jacob Abrams</author>
	<guid>https://www.akamai.com/blog/security/2024/apr/secure-your-apis-with-east-west-visibility</guid>
	<pubDate>Fri, 26 Apr 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Phishing Campaigns Targeting USPS See as Much Web Traffic as the USPS Itself</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/apr/phishing-usps-malicious-domains-traffic-equal-to-legitimate-traffic</link>
	<author>Stijn Tilborghs &amp; Connor Faulkner</author>
	<guid>https://www.akamai.com/blog/security-research/2024/apr/phishing-usps-malicious-domains-traffic-equal-to-legitimate-traffic</guid>
	<pubDate>Thu, 25 Apr 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Getting Started with LLMs: Managing Data Collection</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/apr/getting-started-with-llms-managing-data-collection</link>
	<author>Linode (Linode)</author>
	<guid>https://www.akamai.com/blog/developers/2024/apr/getting-started-with-llms-managing-data-collection</guid>
	<pubDate>Wed, 24 Apr 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How HTTP/2 Persistent Connections Help Improve Performance and User Experience</title>
	<description></description>
	<link>https://www.akamai.com/blog/performance/2024/apr/http2-persistent-connections</link>
	<author>Mihai Puchiu, Santanu Pathak &amp; Julio Chaves Herrera</author>
	<guid>https://www.akamai.com/blog/performance/2024/apr/http2-persistent-connections</guid>
	<pubDate>Tue, 23 Apr 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Keep Your Tech Flame Alive: Trailblazer Samantha Lee</title>
	<description></description>
	<link>https://www.akamai.com/blog/culture/2024/apr/keep-your-tech-flame-alive-trailblazer-samantha-lee</link>
	<author>Akamai FLAME Team</author>
	<guid>https://www.akamai.com/blog/culture/2024/apr/keep-your-tech-flame-alive-trailblazer-samantha-lee</guid>
	<pubDate>Mon, 22 Apr 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The 8 Most Common Causes of Data Breaches</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/apr/8-most-common-causes-of-data-breaches</link>
	<author>Anurag Anuj</author>
	<guid>https://www.akamai.com/blog/security/2024/apr/8-most-common-causes-of-data-breaches</guid>
	<pubDate>Fri, 19 Apr 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Data Matters — The Value of Visibility in API Security</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/apr/the-value-of-visibility-in-api-security</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/2024/apr/the-value-of-visibility-in-api-security</guid>
	<pubDate>Thu, 18 Apr 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Takes Home Three 2024 Stevie® Awards for Sales &amp; Customer Service</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/apr/akamai-takes-home-three-2024-stevie-awards-for-sales-customer-service</link>
	<author>Jim Ackley</author>
	<guid>https://www.akamai.com/blog/developers/2024/apr/akamai-takes-home-three-2024-stevie-awards-for-sales-customer-service</guid>
	<pubDate>Wed, 17 Apr 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Empowering Change: Using Your Influence to Confront the Climate Crisis</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2024/apr/using-your-influence-to-confront-the-climate-crisis</link>
	<author>Margot Hines</author>
	<guid>https://www.akamai.com/blog/sustainability/2024/apr/using-your-influence-to-confront-the-climate-crisis</guid>
	<pubDate>Mon, 15 Apr 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>CreateRCE — Yet Another Vulnerability in CreateUri</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/apr/critical-vulnerability-create-uri-remote-code-execution</link>
	<author>Ben Barnea</author>
	<guid>https://www.akamai.com/blog/security-research/2024/apr/critical-vulnerability-create-uri-remote-code-execution</guid>
	<pubDate>Fri, 12 Apr 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>API Cyberattacks: A Growing Threat for Organizations in Latin America</title>
	<description>Learn about the growing threat of API cyberattacks and their effect on industries across Latin America.</description>
	<link>https://www.akamai.com/blog/security/2024/apr/api-cyberattacks-growing-threat-organizations-latin-america</link>
	<author>Helder Ferrão</author>
	<guid>https://www.akamai.com/blog/security/2024/apr/api-cyberattacks-growing-threat-organizations-latin-america</guid>
	<pubDate>Fri, 12 Apr 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on April’s Patch Tuesday 2024</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/apr/akamai-perspective-patch-tuesday-april-2024</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2024/apr/akamai-perspective-patch-tuesday-april-2024</guid>
	<pubDate>Fri, 12 Apr 2024 06:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Dramatically Simplify PCI DSS Compliance</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/apr/dramatically-simplify-pci-dss-compliance</link>
	<author>Ravit Greitser</author>
	<guid>https://www.akamai.com/blog/security/2024/apr/dramatically-simplify-pci-dss-compliance</guid>
	<pubDate>Thu, 11 Apr 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Comparing the Benefits of Microsegmentation vs. VLANs</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/apr/comparing-the-benefits-of-microsegmentation-versus-vlans</link>
	<author>Jacob Abrams</author>
	<guid>https://www.akamai.com/blog/security/2024/apr/comparing-the-benefits-of-microsegmentation-versus-vlans</guid>
	<pubDate>Wed, 10 Apr 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Shield NS53 Protects Your Origin DNS Infrastructure from NXDOMAIN Attacks</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/apr/shield-ns53-protects-from-nxdomain-attacks</link>
	<author>Sandeep Rath &amp; Venkat Praneeth Nangineni</author>
	<guid>https://www.akamai.com/blog/security/2024/apr/shield-ns53-protects-from-nxdomain-attacks</guid>
	<pubDate>Tue, 09 Apr 2024 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Noname Security Platform Updates: 3.29 Release</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-329-release</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-329-release</guid>
	<pubDate>Tue, 09 Apr 2024 02:07:00 UTC</pubDate>

</item>
<item>
	<title>Why Payers Are Pivotal to API Security Across the Healthcare Ecosystem</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/payers-are-pivotal-to-api-security-across-healthcare</link>
	<author>Carley Thornell</author>
	<guid>https://www.akamai.com/blog/security-research/payers-are-pivotal-to-api-security-across-healthcare</guid>
	<pubDate>Mon, 08 Apr 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Keep Your Tech Flame Alive: Akamai Trailblazer Alex Virley</title>
	<description></description>
	<link>https://www.akamai.com/blog/culture/2024/apr/keep-your-flame-alive-akamai-trailblazer-alex-virley</link>
	<author>Akamai FLAME Team</author>
	<guid>https://www.akamai.com/blog/culture/2024/apr/keep-your-flame-alive-akamai-trailblazer-alex-virley</guid>
	<pubDate>Thu, 04 Apr 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Welcome to 2024: A Year in Review with Akamai Hunt</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/apr/a-year-in-review-with-akamai-hunt</link>
	<author>Shivangi Pandey</author>
	<guid>https://www.akamai.com/blog/security/2024/apr/a-year-in-review-with-akamai-hunt</guid>
	<pubDate>Wed, 03 Apr 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>KeyTrap Highlights Need for Enduring DNS Defenses for Service Providers</title>
	<description>DNS resolvers must be highly resilient to malicious activity like DoS attacks and cache poisoning. Akamai CacheServe delivers enduring defenses.</description>
	<link>https://www.akamai.com/blog/security/2024/apr/keytrap-highlights-need-enduring-dns-defenses-service-providers</link>
	<author>Bruce Van Nice, Mark Dokter &amp; Jan Schaumann</author>
	<guid>https://www.akamai.com/blog/security/2024/apr/keytrap-highlights-need-enduring-dns-defenses-service-providers</guid>
	<pubDate>Wed, 03 Apr 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Introduction to Flow-IPC: Open Source Toolkit for Low-Latency Inter-Process Communication in C++</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/apr/flow-ipc-introduction-low-latency-cpp-toolkit</link>
	<author>Yuri Goldfeld</author>
	<guid>https://www.akamai.com/blog/developers/2024/apr/flow-ipc-introduction-low-latency-cpp-toolkit</guid>
	<pubDate>Tue, 02 Apr 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Sustainability Team Is Listening. Here’s What We Heard.</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2024/apr/the-sustainability-team-is-listening</link>
	<author>Owen Mattison</author>
	<guid>https://www.akamai.com/blog/sustainability/2024/apr/the-sustainability-team-is-listening</guid>
	<pubDate>Tue, 02 Apr 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>XZ Utils Backdoor — Everything You Need to Know, and What You Can Do</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/apr/critical-linux-backdoor-xz-utils-discovered-what-to-know</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2024/apr/critical-linux-backdoor-xz-utils-discovered-what-to-know</guid>
	<pubDate>Mon, 01 Apr 2024 16:00:00 UTC</pubDate>

</item>
<item>
	<title>Our People and Our Growth: Key Drivers of Akamai’s ESG Strategy</title>
	<description></description>
	<link>https://www.akamai.com/blog/culture/2024/apr/key-drivers-of-akamais-esg-strategy</link>
	<author>Khalil Smith</author>
	<guid>https://www.akamai.com/blog/culture/2024/apr/key-drivers-of-akamais-esg-strategy</guid>
	<pubDate>Mon, 01 Apr 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Honey, I Lost My Credentials! Finding Plaintext Credentials on the Internet</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/mar/akamai-hunt-finds-plaintext-credentials-on-public-internet</link>
	<author>Yonatan Gilvarg</author>
	<guid>https://www.akamai.com/blog/security-research/2024/mar/akamai-hunt-finds-plaintext-credentials-on-public-internet</guid>
	<pubDate>Thu, 28 Mar 2024 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Customers Champion Akamai Security Solutions, Support, and Partnership</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/mar/customers-champion-akamai-security-solutions</link>
	<author>Michael Kleef</author>
	<guid>https://www.akamai.com/blog/security/2024/mar/customers-champion-akamai-security-solutions</guid>
	<pubDate>Tue, 26 Mar 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Noname Security Platform Updates: 3.28 Release</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-328-release</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-328-release</guid>
	<pubDate>Sat, 23 Mar 2024 02:37:00 UTC</pubDate>

</item>
<item>
	<title>Distributed Cloud and Edge Computing: A Cheat Sheet for IT Leaders</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2024/mar/distributed-cloud-edge-computing-cheat-sheet-it-leaders</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/cloud/2024/mar/distributed-cloud-edge-computing-cheat-sheet-it-leaders</guid>
	<pubDate>Fri, 22 Mar 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Akamai Foundation Continues to Give Back and Amplify Impact</title>
	<description></description>
	<link>https://www.akamai.com/blog/culture/2024/mar/the-akamai-foundation-continues-to-give-back</link>
	<author>Kara DiGiacomo</author>
	<guid>https://www.akamai.com/blog/culture/2024/mar/the-akamai-foundation-continues-to-give-back</guid>
	<pubDate>Fri, 22 Mar 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Customer Trust Built on Partnership and Best User Experience</title>
	<description></description>
	<link>https://www.akamai.com/blog/performance/2024/mar/akamai-customer-trust-built-on-partnership-best-user-experience</link>
	<author>Balakrishnan Nair</author>
	<guid>https://www.akamai.com/blog/performance/2024/mar/akamai-customer-trust-built-on-partnership-best-user-experience</guid>
	<pubDate>Thu, 21 Mar 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Abusing the DHCP Administrators Group to Escalate Privileges in Windows Domains</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/feb/abusing-dhcp-administrators-group-for-privilege-escalation-in-windows-domains</link>
	<author>Ori David</author>
	<guid>https://www.akamai.com/blog/security-research/2024/feb/abusing-dhcp-administrators-group-for-privilege-escalation-in-windows-domains</guid>
	<pubDate>Wed, 20 Mar 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Lurking in the Shadows: Attack Trends Shine Light on API Threats</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/attack-trends-shine-light-on-api-threats</link>
	<author>Steve Winterfeld &amp; Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/attack-trends-shine-light-on-api-threats</guid>
	<pubDate>Tue, 19 Mar 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Recognizing Progress and Living Our Values: Akamai’s 2023 ESG Impact Report</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2024/mar/akamai-2023-esg-impact-report</link>
	<author>Saskia Schwartz</author>
	<guid>https://www.akamai.com/blog/sustainability/2024/mar/akamai-2023-esg-impact-report</guid>
	<pubDate>Mon, 18 Mar 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on March’s Patch Tuesday 2024</title>
	<description>Don’t let your pies burn while you read patch notes. March’s 2024’s Patch Tuesday has 60 total CVE, with two critical in Hyper-V.</description>
	<link>https://www.akamai.com/blog/security-research/2024/mar/akamai-perspective-patch-tuesday-march-2024</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2024/mar/akamai-perspective-patch-tuesday-march-2024</guid>
	<pubDate>Thu, 14 Mar 2024 18:00:00 UTC</pubDate>

</item>
<item>
	<title>Cyber Strategy: Don’t Focus on Prevention — Master Resilience</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/mar/dont-focus-on-prevention-master-resilience</link>
	<author>Cheryl Chiodi</author>
	<guid>https://www.akamai.com/blog/security/2024/mar/dont-focus-on-prevention-master-resilience</guid>
	<pubDate>Thu, 14 Mar 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What a Cluster: Local Volumes Vulnerability in Kubernetes</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/mar/kubernetes-local-volumes-command-injection-vulnerability-rce-system-privileges</link>
	<author>Tomer Peled</author>
	<guid>https://www.akamai.com/blog/security-research/2024/mar/kubernetes-local-volumes-command-injection-vulnerability-rce-system-privileges</guid>
	<pubDate>Wed, 13 Mar 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Discover the 3 Trends Driving API Security Compliance</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/mar/3-trends-driving-api-security-compliance</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/2024/mar/3-trends-driving-api-security-compliance</guid>
	<pubDate>Wed, 13 Mar 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Security Solutions — Everywhere Your Business Meets the World</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/mar/akamai-security-solutions</link>
	<author>Michael Kleef</author>
	<guid>https://www.akamai.com/blog/security/2024/mar/akamai-security-solutions</guid>
	<pubDate>Tue, 12 Mar 2024 06:00:00 UTC</pubDate>

</item>
<item>
	<title>State of the Cloud: Where We Are and Where We’re Heading</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2024/mar/state-of-the-cloud-where-we-are-where-were-heading</link>
	<author>Jay Jenkins</author>
	<guid>https://www.akamai.com/blog/cloud/2024/mar/state-of-the-cloud-where-we-are-where-were-heading</guid>
	<pubDate>Mon, 11 Mar 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Enhancing Object Storage Performance: Introducing NVMe Hardware and Expanded Capacity</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/mar/nvme-object-storage-enhanced-performance</link>
	<author>Prasoon Pushkar</author>
	<guid>https://www.akamai.com/blog/developers/2024/mar/nvme-object-storage-enhanced-performance</guid>
	<pubDate>Mon, 11 Mar 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Elevate Your Web Monitoring Experience with Managed Web Monitoring</title>
	<description></description>
	<link>https://www.akamai.com/blog/edge/2024/mar/elevate-your-web-monitoring-experience-with-managed-web-monitoring</link>
	<author>Leslie Stansbury</author>
	<guid>https://www.akamai.com/blog/edge/2024/mar/elevate-your-web-monitoring-experience-with-managed-web-monitoring</guid>
	<pubDate>Fri, 08 Mar 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>AkaNAT: How Akamai Uses Machine Learning to Detect Shared IPs</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/mar/how-akamai-uses-machine-learning-to-detect-shared-ips</link>
	<author>Chen Doytshman</author>
	<guid>https://www.akamai.com/blog/security/2024/mar/how-akamai-uses-machine-learning-to-detect-shared-ips</guid>
	<pubDate>Fri, 08 Mar 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Enhance Customers’ Security Posture: Akamai SOCC Advanced Service</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/mar/akamai-socc-advanced-service</link>
	<author>Stacey Sweeney</author>
	<guid>https://www.akamai.com/blog/security/2024/mar/akamai-socc-advanced-service</guid>
	<pubDate>Thu, 07 Mar 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Leaking NTLM Credentials Through Windows Themes</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/mar/leaking-ntlm-credentials-through-windows-themes</link>
	<author>Tomer Peled</author>
	<guid>https://www.akamai.com/blog/security-research/2024/mar/leaking-ntlm-credentials-through-windows-themes</guid>
	<pubDate>Wed, 06 Mar 2024 15:00:00 UTC</pubDate>

</item>
<item>
	<title>NetKiller.Condi Botnet Exploits CVE-2024-0778 One Week After Disclosure</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/mar/netkiller-condi-botnet-exploits-camera</link>
	<author>Kyle Lefton &amp; Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security-research/2024/mar/netkiller-condi-botnet-exploits-camera</guid>
	<pubDate>Tue, 05 Mar 2024 15:00:00 UTC</pubDate>

</item>
<item>
	<title>6 Ways Akamai Innovates to Strengthen Their Leadership in Application Security</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/feb/app-and-api-protector-strengthens-your-api-defenses</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/2024/feb/app-and-api-protector-strengthens-your-api-defenses</guid>
	<pubDate>Mon, 04 Mar 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Address the Challenges of Compliance and Cybersecurity with Zero Trust</title>
	<description>The intersection of compliance and cybersecurity is an opportunity for your organization to adopt solutions that simultaneously solve challenges in both areas.</description>
	<link>https://www.akamai.com/blog/security/2024/feb/address-challenges-compliance-cybersecurity-zero-trust</link>
	<author>Ravit Greitser</author>
	<guid>https://www.akamai.com/blog/security/2024/feb/address-challenges-compliance-cybersecurity-zero-trust</guid>
	<pubDate>Fri, 01 Mar 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>The Benefits of Microsegmentation for Compliance</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/mar/the-benefits-of-microsegmentation-for-compliance</link>
	<author>Ravit Greitser</author>
	<guid>https://www.akamai.com/blog/security/2024/mar/the-benefits-of-microsegmentation-for-compliance</guid>
	<pubDate>Fri, 01 Mar 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Push vs. Pull-Based Architecture in GitOps</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/mar/push-vs-pull-based-architecture-in-gitops</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/developers/2024/mar/push-vs-pull-based-architecture-in-gitops</guid>
	<pubDate>Fri, 01 Mar 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Noname Security Platform Updates: 3.27 Release</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-327-release</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-327-release</guid>
	<pubDate>Fri, 01 Mar 2024 03:19:00 UTC</pubDate>

</item>
<item>
	<title>Is Network Security Still a Thing in the Age of Public Cloud?</title>
	<description>Akamai Guardicore Segmentation is extending its segmentation capabilities to hybrid cloud environments.</description>
	<link>https://www.akamai.com/blog/security/2024/feb/network-security-age-public-cloud</link>
	<author>Ravit Greitser</author>
	<guid>https://www.akamai.com/blog/security/2024/feb/network-security-age-public-cloud</guid>
	<pubDate>Tue, 27 Feb 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Keep Your Tech Flame Alive: Akamai Trailblazer — Richa Dayal</title>
	<description></description>
	<link>https://www.akamai.com/blog/culture/2024/feb/keep-your-tech-flame-alive-akamai-trailblazer-richa-dayal</link>
	<author>Akamai FLAME Team</author>
	<guid>https://www.akamai.com/blog/culture/2024/feb/keep-your-tech-flame-alive-akamai-trailblazer-richa-dayal</guid>
	<pubDate>Mon, 26 Feb 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Advocating for Inclusion in Tech</title>
	<description></description>
	<link>https://www.akamai.com/blog/culture/2024/feb/advocating-for-inclusion-in-tech</link>
	<author>Tashema Nichols-Jones</author>
	<guid>https://www.akamai.com/blog/culture/2024/feb/advocating-for-inclusion-in-tech</guid>
	<pubDate>Fri, 23 Feb 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Workloads on Any Cloud: Designing a Cloud Portability Strategy</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/feb/cloud-portability-strategy-benefits</link>
	<author>Billy Thompson</author>
	<guid>https://www.akamai.com/blog/developers/2024/feb/cloud-portability-strategy-benefits</guid>
	<pubDate>Thu, 22 Feb 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Exploitation Observed: Ivanti Connect Secure — CVE-2023-46805 and CVE-2024-21887</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/feb/ivanti-january-rce-cve-zero-day-exploitation-observed</link>
	<author>Noam Atias &amp; Sam Tinklenberg</author>
	<guid>https://www.akamai.com/blog/security-research/2024/feb/ivanti-january-rce-cve-zero-day-exploitation-observed</guid>
	<pubDate>Wed, 21 Feb 2024 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Data Matters — Empowering Threat Hunters to Reduce API Risk</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/feb/data-matters-empowering-threat-hunters-to-reduce-api-risk</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/2024/feb/data-matters-empowering-threat-hunters-to-reduce-api-risk</guid>
	<pubDate>Wed, 21 Feb 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on February’s Patch Tuesday 2024</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/feb/akamai-perspective-patch-tuesday-february-2024</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2024/feb/akamai-perspective-patch-tuesday-february-2024</guid>
	<pubDate>Fri, 16 Feb 2024 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Will VPN Security Vulnerabilities Accelerate ZTNA Adoption?</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/feb/will-vpn-security-vulnerabilities-accelerate-ztna-adoption</link>
	<author>Andrew Terranova &amp; Tommy Cormier</author>
	<guid>https://www.akamai.com/blog/security/2024/feb/will-vpn-security-vulnerabilities-accelerate-ztna-adoption</guid>
	<pubDate>Thu, 15 Feb 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>CVE-2023-50387 and CVE-2023-50868 — DNS Exploit KeyTrap Posed Major Internet Threat</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/feb/dns-exploit-keytrap-posed-major-internet-threat</link>
	<author>Ralf Weber, Jan Schaumann &amp; Bruce Van Nice</author>
	<guid>https://www.akamai.com/blog/security/2024/feb/dns-exploit-keytrap-posed-major-internet-threat</guid>
	<pubDate>Thu, 15 Feb 2024 07:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s Next for Akamai’s Cloud Computing Strategy</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2024/feb/whats-next-for-akamais-cloud-computing-strategy</link>
	<author>Tom Leighton</author>
	<guid>https://www.akamai.com/blog/cloud/2024/feb/whats-next-for-akamais-cloud-computing-strategy</guid>
	<pubDate>Wed, 14 Feb 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Scanning Activity for CVE-2024-22024 (XXE) Vulnerability in Ivanti</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/feb/scanning-activity-ivanti-cve-february-2024</link>
	<author>Sam Tinklenberg &amp; Noam Atias</author>
	<guid>https://www.akamai.com/blog/security-research/2024/feb/scanning-activity-ivanti-cve-february-2024</guid>
	<pubDate>Wed, 14 Feb 2024 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Say Goodbye to Monolithic EdgeWorkers:  Introducing Flexible Composition (Part 2)</title>
	<description></description>
	<link>https://www.akamai.com/blog/edge/2024/feb/introducing-flexible-composition-part-2</link>
	<author>Evan Hughes &amp; AJ Johnson</author>
	<guid>https://www.akamai.com/blog/edge/2024/feb/introducing-flexible-composition-part-2</guid>
	<pubDate>Tue, 13 Feb 2024 08:00:00 UTC</pubDate>

</item>
<item>
	<title>Data Matters — Is Your API Security Data Rich or Data Poor?</title>
	<description>Taking a data-rich approach to security is the most effective way to stay a step ahead of today’s quickly evolving API threats.</description>
	<link>https://www.akamai.com/blog/security/2024/feb/data-matters-api-security-data-rich-data-poor</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/2024/feb/data-matters-api-security-data-rich-data-poor</guid>
	<pubDate>Mon, 12 Feb 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>The AnyDesk Breach: Overview and Recommendations</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/feb/anydesk-breach-what-to-know-mitigations-and-recommendations</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2024/feb/anydesk-breach-what-to-know-mitigations-and-recommendations</guid>
	<pubDate>Wed, 07 Feb 2024 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Named an Overall Leader for Zero Trust Network Access</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/feb/akamai-named-an-overall-leader-for-zero-trust-network-access</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/2024/feb/akamai-named-an-overall-leader-for-zero-trust-network-access</guid>
	<pubDate>Wed, 07 Feb 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Stop Scrapers and Scalpers with Akamai Content Protector</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/feb/stop-scrapers-and-scalpers-with-akamai-content-protector</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/2024/feb/stop-scrapers-and-scalpers-with-akamai-content-protector</guid>
	<pubDate>Tue, 06 Feb 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>The Web Scraping Problem, Part 3: Protecting Against Botnets</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/feb/the-web-scraping-problem-part-three-protecting-against-botnets</link>
	<author>David Sénécal</author>
	<guid>https://www.akamai.com/blog/security/2024/feb/the-web-scraping-problem-part-three-protecting-against-botnets</guid>
	<pubDate>Tue, 06 Feb 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>What to Do When Your VPN Provider Suffers from Zero-Day Vulnerabilities</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/feb/vpn-provider-suffers-from-zero-day-vulnerabilities</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/2024/feb/vpn-provider-suffers-from-zero-day-vulnerabilities</guid>
	<pubDate>Mon, 05 Feb 2024 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Web Scraping Problem, Part 2: Use Cases that Require Scraping</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/feb/the-web-scraping-problem-part-2</link>
	<author>David Sénécal</author>
	<guid>https://www.akamai.com/blog/security/2024/feb/the-web-scraping-problem-part-2</guid>
	<pubDate>Mon, 05 Feb 2024 08:00:00 UTC</pubDate>

</item>
<item>
	<title>Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/feb/fritzfrog-botnet-new-capabilities-log4shell</link>
	<author>Ori David</author>
	<guid>https://www.akamai.com/blog/security-research/2024/feb/fritzfrog-botnet-new-capabilities-log4shell</guid>
	<pubDate>Thu, 01 Feb 2024 15:00:00 UTC</pubDate>

</item>
<item>
	<title>The Noname Security 3.26 Release Supports Integration with Fastly</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/aug/the-noname-security-3-26-release</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2024/aug/the-noname-security-3-26-release</guid>
	<pubDate>Thu, 01 Feb 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>How Akamai Volunteers Helped Restore Costa Rica’s Most Polluted Beach</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2024/jan/akamai-volunteers-helped-restore-costa-ricas-most-polluted-beach</link>
	<author>brojas@akamai.com (Braulio Rojas)</author>
	<guid>https://www.akamai.com/blog/sustainability/2024/jan/akamai-volunteers-helped-restore-costa-ricas-most-polluted-beach</guid>
	<pubDate>Wed, 31 Jan 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>The Web Scraping Problem: Part 1</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/jan/the-web-scraping-problem-part-1</link>
	<author>David Sénécal</author>
	<guid>https://www.akamai.com/blog/security/2024/jan/the-web-scraping-problem-part-1</guid>
	<pubDate>Tue, 30 Jan 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Actively Exploited Vulnerability in Hitron DVRs: Fixed, Patches Available</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/jan/hitron-zero-day-vulnerability-spreading-mirai-patched</link>
	<author>Aline Eliovich, Kyle Lefton, Chad Seaman &amp; Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security-research/2024/jan/hitron-zero-day-vulnerability-spreading-mirai-patched</guid>
	<pubDate>Tue, 30 Jan 2024 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Keep Your Tech FLAME Alive</title>
	<description></description>
	<link>https://www.akamai.com/blog/culture/2024/jan/keep-your-tech-flame-alive</link>
	<author>Natalie Billingham</author>
	<guid>https://www.akamai.com/blog/culture/2024/jan/keep-your-tech-flame-alive</guid>
	<pubDate>Mon, 29 Jan 2024 09:00:00 UTC</pubDate>

</item>
<item>
	<title>Worried About Bot Attacks on B2C APIs? You May Be Missing a Bigger Risk</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/jan/b2b-apis-present-potentially-devastating-risks</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/2024/jan/b2b-apis-present-potentially-devastating-risks</guid>
	<pubDate>Mon, 29 Jan 2024 06:00:00 UTC</pubDate>

</item>
<item>
	<title>API Security: Best Practices for API Activity Data Acquisition</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/jan/api-security-best-practices-for-api-activity-data-acquisition</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/2024/jan/api-security-best-practices-for-api-activity-data-acquisition</guid>
	<pubDate>Thu, 25 Jan 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>What Is API Detection and Response?</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/jan/what-is-api-detection-and-response</link>
	<author>Edward Roberts</author>
	<guid>https://www.akamai.com/blog/security/2024/jan/what-is-api-detection-and-response</guid>
	<pubDate>Thu, 25 Jan 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Integrating mPulse’s Beacon API with EdgeWorkers to Visualize All Client Requests</title>
	<description>Akamai mPulse combines with Akamai EdgeWorkers to visualize any client request and uses its http-request module to let users send their own requests.</description>
	<link>https://www.akamai.com/blog/edge/2024/jan/integrating-mpulses-beacon-api-edgeworkers-visualize-client-requests</link>
	<author>Hitoshi Kaneko</author>
	<guid>https://www.akamai.com/blog/edge/2024/jan/integrating-mpulses-beacon-api-edgeworkers-visualize-client-requests</guid>
	<pubDate>Wed, 24 Jan 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Reduce API Security Risk by Fixing Runtime Threats in Code Faster</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/jan/reduce-api-security-risk-fixing-runtime-threats-in-code-faster</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/2024/jan/reduce-api-security-risk-fixing-runtime-threats-in-code-faster</guid>
	<pubDate>Tue, 16 Jan 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on January’s Patch Tuesday 2024</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/jan/akamai-perspective-patch-tuesday-january-2024</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2024/jan/akamai-perspective-patch-tuesday-january-2024</guid>
	<pubDate>Fri, 12 Jan 2024 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Noname Security Platform Updates: 3.25 Release</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-325-release</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-325-release</guid>
	<pubDate>Thu, 11 Jan 2024 20:23:00 UTC</pubDate>

</item>
<item>
	<title>You Had Me at Hi — Mirai-Based NoaBot Makes an Appearance</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2024/jan/mirai-based-noabot-crypto-mining</link>
	<author>Stiv Kupchik</author>
	<guid>https://www.akamai.com/blog/security-research/2024/jan/mirai-based-noabot-crypto-mining</guid>
	<pubDate>Wed, 10 Jan 2024 15:00:00 UTC</pubDate>

</item>
<item>
	<title>How Edge Computing Is Transforming Healthcare</title>
	<description>There are myriad ways the healthcare and life sciences ecosystem benefits from edge computing. Read about the top five use cases for edge computing in healthcare.</description>
	<link>https://www.akamai.com/blog/security/2024/jan/how-edge-computing-transforming-healthcare</link>
	<author>Carley Thornell</author>
	<guid>https://www.akamai.com/blog/security/2024/jan/how-edge-computing-transforming-healthcare</guid>
	<pubDate>Wed, 10 Jan 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Make Git Your Single Source of Truth for Application and Infrastructure Delivery</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/jan/gitops-automation-strategy-benefits</link>
	<author>Billy Thompson</author>
	<guid>https://www.akamai.com/blog/developers/2024/jan/gitops-automation-strategy-benefits</guid>
	<pubDate>Wed, 10 Jan 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>A Retrospective on DDoS Trends in 2023 and Actionable Strategies for 2024</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/jan/a-retrospective-on-ddos-trends-in-2023</link>
	<author>Sven Dummer &amp; Sandeep Rath</author>
	<guid>https://www.akamai.com/blog/security/2024/jan/a-retrospective-on-ddos-trends-in-2023</guid>
	<pubDate>Tue, 09 Jan 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Safeguarding Patient Health Data Means Balancing Access and Security</title>
	<description>Increased access to health data can leave providers and insurers vulnerable to data breaches, so it’s vital to invest in cybersecurity that can protect networks.</description>
	<link>https://www.akamai.com/blog/security/2023/dec/safeguarding-patient-health-data-balancing-access-security</link>
	<author>Carley Thornell</author>
	<guid>https://www.akamai.com/blog/security/2023/dec/safeguarding-patient-health-data-balancing-access-security</guid>
	<pubDate>Tue, 02 Jan 2024 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Customize Deployments with Akamai's Metadata Service</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2024/jan/customize-deployments-with-akamais-metadata-service</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/developers/2024/jan/customize-deployments-with-akamais-metadata-service</guid>
	<pubDate>Tue, 02 Jan 2024 10:20:00 UTC</pubDate>

</item>
<item>
	<title>Weaponizing DHCP DNS Spoofing — A Hands-On Guide</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/dec/weaponizing-dhcp-dns-spoofing-hands-on-guide</link>
	<author>Ori David</author>
	<guid>https://www.akamai.com/blog/security-research/2023/dec/weaponizing-dhcp-dns-spoofing-hands-on-guide</guid>
	<pubDate>Thu, 21 Dec 2023 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Responsibility to Our Enterprise Customers</title>
	<description></description>
	<link>https://www.akamai.com/blog/news/2023/dec/akamai-responsibility-to-our-enterprise-customers</link>
	<author>Adam Karon</author>
	<guid>https://www.akamai.com/blog/news/2023/dec/akamai-responsibility-to-our-enterprise-customers</guid>
	<pubDate>Thu, 21 Dec 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Noname Security Platform Updates: 3.24 Release</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-324-release</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-324-release</guid>
	<pubDate>Thu, 21 Dec 2023 02:40:00 UTC</pubDate>

</item>
<item>
	<title>Women Can Make a Difference in the Field of Data Science</title>
	<description></description>
	<link>https://www.akamai.com/blog/culture/2023/dec/women-can-make-a-difference-in-data-science</link>
	<author>Tashema Nichols-Jones</author>
	<guid>https://www.akamai.com/blog/culture/2023/dec/women-can-make-a-difference-in-data-science</guid>
	<pubDate>Wed, 20 Dec 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>The Do’s and Don’ts of Modern API Security</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/dec/the-dos-and-donts-of-api-security</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/2023/dec/the-dos-and-donts-of-api-security</guid>
	<pubDate>Wed, 20 Dec 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Novel Detection of Process Injection Using Network Anomalies</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/dec/novel-detection-methodology-process-injection-using-network-anomalies</link>
	<author>Ofir Shen</author>
	<guid>https://www.akamai.com/blog/security-research/2023/dec/novel-detection-methodology-process-injection-using-network-anomalies</guid>
	<pubDate>Tue, 19 Dec 2023 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Insights from Survey of Financial Services Cyber Leaders in Asia-Pacific</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/dec/insights-from-survey-financial-services-cyber-leaders-asia-pacific</link>
	<author>Cheryl Chiodi</author>
	<guid>https://www.akamai.com/blog/security/2023/dec/insights-from-survey-financial-services-cyber-leaders-asia-pacific</guid>
	<pubDate>Tue, 19 Dec 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 1</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/dec/chaining-vulnerabilities-to-achieve-rce-part-one</link>
	<author>Ben Barnea</author>
	<guid>https://www.akamai.com/blog/security-research/2023/dec/chaining-vulnerabilities-to-achieve-rce-part-one</guid>
	<pubDate>Mon, 18 Dec 2023 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 2</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/dec/chaining-vulnerabilities-to-achieve-rce-part-two</link>
	<author>Ben Barnea</author>
	<guid>https://www.akamai.com/blog/security-research/2023/dec/chaining-vulnerabilities-to-achieve-rce-part-two</guid>
	<pubDate>Mon, 18 Dec 2023 15:00:00 UTC</pubDate>

</item>
<item>
	<title>The Shift to Distributed Cloud: The Next Era of Cloud Infrastructure</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2023/dec/the-next-era-of-cloud-infrastructure</link>
	<author>Mike Maney</author>
	<guid>https://www.akamai.com/blog/cloud/2023/dec/the-next-era-of-cloud-infrastructure</guid>
	<pubDate>Mon, 18 Dec 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on December’s Patch Tuesday 2023</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/dec/akamai-perspective-patch-tuesday-december-2023</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2023/dec/akamai-perspective-patch-tuesday-december-2023</guid>
	<pubDate>Fri, 15 Dec 2023 18:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Defend Against Digital Cyberthreats This Holiday Season</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/dec/defend-against-digital-cyberthreats-this-holiday-season</link>
	<author>Reuben Koh</author>
	<guid>https://www.akamai.com/blog/security/2023/dec/defend-against-digital-cyberthreats-this-holiday-season</guid>
	<pubDate>Fri, 15 Dec 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>What We've Learned from Media Cloud Adoption Trends</title>
	<description>Read the top takeaways from a global survey of leaders in the media and entertainment industry about their cloud adoption experiences and challenges.</description>
	<link>https://www.akamai.com/blog/cloud/2023/dec/learned-media-cloud-adoption-trends</link>
	<author>Todd Loewenstein &amp; Peter Chave</author>
	<guid>https://www.akamai.com/blog/cloud/2023/dec/learned-media-cloud-adoption-trends</guid>
	<pubDate>Thu, 14 Dec 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Observed Exploitation Attempts of Struts 2 S2-066 Vulnerability (CVE-2023-50164)</title>
	<description>The Akamai Security Intelligence Group has seen numerous exploitation attempts on Apache Struts 2 since December 7, 2023, when a critical CVE was released.</description>
	<link>https://www.akamai.com/blog/security-research/2023/dec/apache-struts-cve-exploitation-attempts</link>
	<author>Maxim Zavodchik, Sam Tinklenberg, Neeraj Pradeep &amp; Noam Atias</author>
	<guid>https://www.akamai.com/blog/security-research/2023/dec/apache-struts-cve-exploitation-attempts</guid>
	<pubDate>Thu, 14 Dec 2023 10:00:40 UTC</pubDate>

</item>
<item>
	<title>Actively Exploited Vulnerability in QNAP VioStor NVR: Fixed, Patches Available</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/dec/qnap-viostor-zero-day-vulnerability-spreading-mirai-patched</link>
	<author>Chad Seaman &amp; Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security-research/2023/dec/qnap-viostor-zero-day-vulnerability-spreading-mirai-patched</guid>
	<pubDate>Thu, 14 Dec 2023 08:00:00 UTC</pubDate>

</item>
<item>
	<title>Our Top Takeaways from 2023 Gartner® Market Guide for Microsegmentation</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/dec/top-takeaways-2023-gartner-market-guide-microsegmentation</link>
	<author>Ravit Greitser</author>
	<guid>https://www.akamai.com/blog/security/2023/dec/top-takeaways-2023-gartner-market-guide-microsegmentation</guid>
	<pubDate>Wed, 13 Dec 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Improve Performance with HTTP/2 Stream Prioritization</title>
	<description></description>
	<link>https://www.akamai.com/blog/performance/2023/dec/improve-performance-with-http2-stream-prioritization</link>
	<author>Mihai Puchiu &amp; Julio Chaves Herrera</author>
	<guid>https://www.akamai.com/blog/performance/2023/dec/improve-performance-with-http2-stream-prioritization</guid>
	<pubDate>Tue, 12 Dec 2023 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai EdgeWorkers for SaaS: Balancing Customization and Security</title>
	<description></description>
	<link>https://www.akamai.com/blog/edge/2023/dec/akamai-edgeworkers-for-saas-balancing-customization-and-security</link>
	<author>Aaron Alquist</author>
	<guid>https://www.akamai.com/blog/edge/2023/dec/akamai-edgeworkers-for-saas-balancing-customization-and-security</guid>
	<pubDate>Mon, 11 Dec 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Going Cloud Native, and What “Portability” Really Means</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2023/dec/going-cloud-native-what-portability-really-means</link>
	<author>Jay Jenkins</author>
	<guid>https://www.akamai.com/blog/cloud/2023/dec/going-cloud-native-what-portability-really-means</guid>
	<pubDate>Fri, 08 Dec 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Spoofing DNS Records by Abusing DHCP DNS Dynamic Updates</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/dec/spoofing-dns-by-abusing-dhcp</link>
	<author>Ori David</author>
	<guid>https://www.akamai.com/blog/security-research/2023/dec/spoofing-dns-by-abusing-dhcp</guid>
	<pubDate>Thu, 07 Dec 2023 15:00:00 UTC</pubDate>

</item>
<item>
	<title>November’s Shopping Holidays: Online Shopping, Sales, and Magecart Attacks</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/dec/online-shopping-sales-and-magecart-attacks</link>
	<author>Gal Meiri</author>
	<guid>https://www.akamai.com/blog/security-research/2023/dec/online-shopping-sales-and-magecart-attacks</guid>
	<pubDate>Thu, 07 Dec 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Monolith Versus Microservices: Weigh the Pros and Cons of Both Configs</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2023/dec/monolith-versus-microservices-weigh-the-difference</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/cloud/2023/dec/monolith-versus-microservices-weigh-the-difference</guid>
	<pubDate>Wed, 06 Dec 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Actively Exploited Vulnerability in FXC Routers: Fixed, Patches Available</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/dec/zero-day-vulnerability-spreading-mirai-patched</link>
	<author>Kyle Lefton, Chad Seaman &amp; Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security-research/2023/dec/zero-day-vulnerability-spreading-mirai-patched</guid>
	<pubDate>Wed, 06 Dec 2023 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Account Protector’s New Protection Against Account Opening Abuse</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/nov/akamai-account-protector-abuse-protection-solution</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/2023/nov/akamai-account-protector-abuse-protection-solution</guid>
	<pubDate>Mon, 04 Dec 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Healthcare Trends in 2024: Challenges and Opportunities</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/dec/healthcare-trends-in-2024-challenges-and-opportunities</link>
	<author>Carley Thornell</author>
	<guid>https://www.akamai.com/blog/security/2023/dec/healthcare-trends-in-2024-challenges-and-opportunities</guid>
	<pubDate>Mon, 04 Dec 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Noname Security Platform Updates: November 2023</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-november-2023</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2024/sep/noname-security-platform-updates-november-2023</guid>
	<pubDate>Sat, 02 Dec 2023 01:21:00 UTC</pubDate>

</item>
<item>
	<title>What Is Distributed Cloud and Why Should You Care?</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2023/nov/what-is-distributed-cloud-why-should-you-care</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/cloud/2023/nov/what-is-distributed-cloud-why-should-you-care</guid>
	<pubDate>Fri, 01 Dec 2023 16:16:00 UTC</pubDate>

</item>
<item>
	<title>Say Goodbye to Monolithic EdgeWorkers:  Introducing Flexible Composition (Part 1) </title>
	<description></description>
	<link>https://www.akamai.com/blog/edge/2023/nov/say-goodbye-to-monolithic-edgeworkers-introducing-flexible-composition-part-1</link>
	<author>Evan Hughes &amp; AJ Johnson</author>
	<guid>https://www.akamai.com/blog/edge/2023/nov/say-goodbye-to-monolithic-edgeworkers-introducing-flexible-composition-part-1</guid>
	<pubDate>Tue, 28 Nov 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Defeat Web Shell WSO-NG</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/nov/defeating-webshells-wso-ng</link>
	<author>Dennis German &amp; Maxim Zavodchik</author>
	<guid>https://www.akamai.com/blog/security-research/2023/nov/defeating-webshells-wso-ng</guid>
	<pubDate>Wed, 22 Nov 2023 15:00:00 UTC</pubDate>

</item>
<item>
	<title>InfectedSlurs Botnet Spreads Mirai via Zero-Days</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/nov/new-rce-botnet-spreads-mirai-via-zero-days</link>
	<author>Akamai SIRT</author>
	<guid>https://www.akamai.com/blog/security-research/2023/nov/new-rce-botnet-spreads-mirai-via-zero-days</guid>
	<pubDate>Tue, 21 Nov 2023 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai EdgeWorkers and Uniform: Personalize Web Pages at Scale Without Flicker</title>
	<description></description>
	<link>https://www.akamai.com/blog/edge/2023/nov/akamai-edgeworkers-uniform-personalize-web-pages-at-scale-without-flicker</link>
	<author>Alex Shyba</author>
	<guid>https://www.akamai.com/blog/edge/2023/nov/akamai-edgeworkers-uniform-personalize-web-pages-at-scale-without-flicker</guid>
	<pubDate>Mon, 20 Nov 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Improve User Experience with Parallel Execution of HTTP/2 Multiplexed Requests</title>
	<description></description>
	<link>https://www.akamai.com/blog/performance/2023/nov/improve-ux-with-http2-multiplexed-requests</link>
	<author>Mihai Puchiu &amp; Julio Chaves Herrera</author>
	<guid>https://www.akamai.com/blog/performance/2023/nov/improve-ux-with-http2-multiplexed-requests</guid>
	<pubDate>Fri, 17 Nov 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on November’s Patch Tuesday 2023</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/nov/akamai-perspective-patch-tuesday-november-2023</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2023/nov/akamai-perspective-patch-tuesday-november-2023</guid>
	<pubDate>Thu, 16 Nov 2023 15:00:00 UTC</pubDate>

</item>
<item>
	<title>What Else Can You Do to Defend Against Bots?</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/2023/nov/what-else-can-you-do-to-defend-against-bots</link>
	<author>Jacob Lovell</author>
	<guid>https://www.akamai.com/blog/developers/2023/nov/what-else-can-you-do-to-defend-against-bots</guid>
	<pubDate>Thu, 16 Nov 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>REST API Security Best Practices</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/nov/rest-api-security-best-practices</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/2023/nov/rest-api-security-best-practices</guid>
	<pubDate>Wed, 15 Nov 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Beyond Vulnerabilities: Why API Abuse Is a Critical Challenge</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/nov/beyond-vulnerabilities-why-api-abuse-is-a-critical-challenge</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/2023/nov/beyond-vulnerabilities-why-api-abuse-is-a-critical-challenge</guid>
	<pubDate>Wed, 15 Nov 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>API Security in a Zero Trust World</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/nov/api-security-in-a-zero-trust-world</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/2023/nov/api-security-in-a-zero-trust-world</guid>
	<pubDate>Wed, 15 Nov 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>What Does XDR Have to Do with API Security?</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/nov/what-does-xdr-have-to-do-with-api-security</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/2023/nov/what-does-xdr-have-to-do-with-api-security</guid>
	<pubDate>Wed, 15 Nov 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Support Telecom Providers on the Journey from Telco to Techco</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/nov/support-telecom-providers-from-telco-to-techco</link>
	<author>Sandra Murphy</author>
	<guid>https://www.akamai.com/blog/security/2023/nov/support-telecom-providers-from-telco-to-techco</guid>
	<pubDate>Mon, 13 Nov 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Virtually Patch Vulnerabilities with Microsegmentation and Akamai Hunt</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/nov/virtually-patch-vulnerabilities-with-microsegmentation-akamai-hunt</link>
	<author>Jacob Abrams</author>
	<guid>https://www.akamai.com/blog/security/2023/nov/virtually-patch-vulnerabilities-with-microsegmentation-akamai-hunt</guid>
	<pubDate>Thu, 09 Nov 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>6 Strategies to Combat Advanced Persistent Threats</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/nov/6-strategies-to-combat-advanced-persistent-threats</link>
	<author>Steve Winterfeld &amp; Sandeep Rath</author>
	<guid>https://www.akamai.com/blog/security/2023/nov/6-strategies-to-combat-advanced-persistent-threats</guid>
	<pubDate>Wed, 08 Nov 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Named an Overall Leader for API Security</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/nov/akamai-named-an-overall-leader-for-api-security</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/2023/nov/akamai-named-an-overall-leader-for-api-security</guid>
	<pubDate>Wed, 08 Nov 2023 10:00:00 UTC</pubDate>

</item>
<item>
	<title>The Hidden Costs of Outsourcing Healthcare Revenue Cycle Management</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/oct/the-hidden-costs-of-outsourcing-healthcare-rcm</link>
	<author>Carley Thornell</author>
	<guid>https://www.akamai.com/blog/security/2023/oct/the-hidden-costs-of-outsourcing-healthcare-rcm</guid>
	<pubDate>Wed, 01 Nov 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Protecting Small and Medium-Sized Businesses from Cyberthreats</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/oct/protecting-small-and-medium-sized-businesses-from-cyberthreats</link>
	<author>Bruce Van Nice</author>
	<guid>https://www.akamai.com/blog/security/2023/oct/protecting-small-and-medium-sized-businesses-from-cyberthreats</guid>
	<pubDate>Fri, 27 Oct 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Defend Against Account Opening Abuse</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/oct/how-to-defend-against-account-opening-abuse</link>
	<author>David Sénécal</author>
	<guid>https://www.akamai.com/blog/security/2023/oct/how-to-defend-against-account-opening-abuse</guid>
	<pubDate>Thu, 26 Oct 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Expert Cybersecurity Awareness: Test Your Attack Knowledge</title>
	<description>Hey, security experts: Can you recognize an attack from the code alone? Test your attack knowledge skills with this quick quiz.</description>
	<link>https://www.akamai.com/blog/security-research/2023/oct/expert-cybersecurity-awareness-test-attack-knowledge</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security-research/2023/oct/expert-cybersecurity-awareness-test-attack-knowledge</guid>
	<pubDate>Wed, 25 Oct 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Importance of Allyship for Women in Tech</title>
	<description></description>
	<link>https://www.akamai.com/blog/culture/2023/oct/the-importance-of-allyship-for-women-in-tech</link>
	<author>Tashema Nichols-Jones</author>
	<guid>https://www.akamai.com/blog/culture/2023/oct/the-importance-of-allyship-for-women-in-tech</guid>
	<pubDate>Tue, 24 Oct 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Get EdgeWorkers Error Reports with mPulse</title>
	<description></description>
	<link>https://www.akamai.com/blog/edge/2023/oct/get-edgeworkers-error-reports-with-mpulse</link>
	<author>Hitoshi Kaneko</author>
	<guid>https://www.akamai.com/blog/edge/2023/oct/get-edgeworkers-error-reports-with-mpulse</guid>
	<pubDate>Mon, 23 Oct 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Detect and Remediate Attacks: Practical Applications for Machine Learning</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/oct/detect-and-remediate-attacks-with-akamai-hunt</link>
	<author>Or Zuckerman, Ido Sakazi , Yarin Ozery &amp; Gil Goren</author>
	<guid>https://www.akamai.com/blog/security/2023/oct/detect-and-remediate-attacks-with-akamai-hunt</guid>
	<pubDate>Fri, 20 Oct 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Deep Analysis of Hospitality Phishing Campaign Shows Global Threat</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/oct/hospitality-phishing-campaign-dns-analysis-global-threat</link>
	<author>Stijn Tilborghs &amp; Connor Faulkner</author>
	<guid>https://www.akamai.com/blog/security-research/2023/oct/hospitality-phishing-campaign-dns-analysis-global-threat</guid>
	<pubDate>Thu, 19 Oct 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>How Fraudsters Execute Account Opening Abuse</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/oct/how-fraudsters-execute-account-opening-abuse</link>
	<author>David Sénécal</author>
	<guid>https://www.akamai.com/blog/security/2023/oct/how-fraudsters-execute-account-opening-abuse</guid>
	<pubDate>Thu, 19 Oct 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Named an Overall Leader in Fraud Reduction Intelligence Platforms</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/oct/akamai-named-leader-in-fraud-reduction-intelligence-platforms</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/2023/oct/akamai-named-leader-in-fraud-reduction-intelligence-platforms</guid>
	<pubDate>Wed, 18 Oct 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How Akamai Protects Customers from HTTP/2 Rapid Reset DDoS Attacks</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/oct/akamai-protects-customers-http2-rapid-reset-ddos-attacks</link>
	<author>Dennis Birchard &amp; Sandeep Rath</author>
	<guid>https://www.akamai.com/blog/security/2023/oct/akamai-protects-customers-http2-rapid-reset-ddos-attacks</guid>
	<pubDate>Mon, 16 Oct 2023 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on October’s Patch Tuesday 2023</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/oct/akamai-perspective-patch-tuesday-october-2023</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2023/oct/akamai-perspective-patch-tuesday-october-2023</guid>
	<pubDate>Thu, 12 Oct 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>An Open Partnership Ecosystem for Building Solutions at the Edge</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2023/oct/an-open-partnership-ecosystem-for-building-solutions-at-the-edge</link>
	<author>Alan Evans</author>
	<guid>https://www.akamai.com/blog/cloud/2023/oct/an-open-partnership-ecosystem-for-building-solutions-at-the-edge</guid>
	<pubDate>Wed, 11 Oct 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The 2023 Akamai Partner Award Winners: A Spotlight on Success</title>
	<description></description>
	<link>https://www.akamai.com/blog/partners/2023/oct/2023-akamai-partner-award-winners</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/partners/2023/oct/2023-akamai-partner-award-winners</guid>
	<pubDate>Tue, 10 Oct 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Art of Concealment: A New Magecart Campaign That’s Abusing 404 Pages</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/oct/magecart-new-technique-404-pages-skimmer</link>
	<author>Roman Lvovsky</author>
	<guid>https://www.akamai.com/blog/security-research/2023/oct/magecart-new-technique-404-pages-skimmer</guid>
	<pubDate>Mon, 09 Oct 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Put Your Best Foot Forward: The Impact of Sneaker Bots on Holiday Shopping</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/oct/cam-sneaker-bots-and-credential-stuffing-this-holiday-season</link>
	<author>Tricia Howard &amp; Joseph Martinez</author>
	<guid>https://www.akamai.com/blog/security-research/2023/oct/cam-sneaker-bots-and-credential-stuffing-this-holiday-season</guid>
	<pubDate>Thu, 05 Oct 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Taking Action on Climate Change at Climate Week NYC 2023</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/2023/oct/taking-action-at-climate-week-nyc-2023</link>
	<author>Mike Mattera</author>
	<guid>https://www.akamai.com/blog/sustainability/2023/oct/taking-action-at-climate-week-nyc-2023</guid>
	<pubDate>Thu, 05 Oct 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Guidance on the Recent Critical libwebp and libvpx Vulnerabilities</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/oct/guidance-on-critical-chrome-vulnerabilities-libwebp-and-libvpx</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/2023/oct/guidance-on-critical-chrome-vulnerabilities-libwebp-and-libvpx</guid>
	<pubDate>Thu, 05 Oct 2023 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Prioritizing the Pharmaceutical Supply Chain for Healthcare Resiliency</title>
	<description></description>
	<link>https://www.akamai.com/blog/edge/2023/oct/prioritizing-the-pharmaceutical-supply-chain-for-healthcare-resiliency</link>
	<author>Carley Thornell</author>
	<guid>https://www.akamai.com/blog/edge/2023/oct/prioritizing-the-pharmaceutical-supply-chain-for-healthcare-resiliency</guid>
	<pubDate>Wed, 04 Oct 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Client-Side Protection &amp; Compliance: Fight Threats, Help Meet PCI DSS v4</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/sep/fight-threats-help-meet-pci-dss-v4</link>
	<author>Emily Lyons</author>
	<guid>https://www.akamai.com/blog/security/2023/sep/fight-threats-help-meet-pci-dss-v4</guid>
	<pubDate>Tue, 03 Oct 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>A QUIC Shutdown: DoS Vulnerability in Windows Servers Running SMB over QUIC</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/sep/smb-over-quic-dos-windows-servers</link>
	<author>Ben Barnea</author>
	<guid>https://www.akamai.com/blog/security-research/2023/sep/smb-over-quic-dos-windows-servers</guid>
	<pubDate>Thu, 28 Sep 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>The High Stakes of Innovation: Attack Trends in Financial Services</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/attack-trends-in-financial-services</link>
	<author>Akamai Security Intelligence Group &amp; Steve Winterfeld</author>
	<guid>https://www.akamai.com/blog/security-research/attack-trends-in-financial-services</guid>
	<pubDate>Wed, 27 Sep 2023 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Pursuing Cyber Resiliency So Healthcare Can Weather the Worst Storms</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/sep/pursuing-cyber-resiliency-so-healthcare-can-weather-the-worst-storms</link>
	<author>Carley Thornell</author>
	<guid>https://www.akamai.com/blog/security/2023/sep/pursuing-cyber-resiliency-so-healthcare-can-weather-the-worst-storms</guid>
	<pubDate>Mon, 25 Sep 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>3 Lessons We've Learned from Successful Cyberattacks</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/sep/3-lessons-learned-from-successful-cyberattacks</link>
	<author>Tony Lauro</author>
	<guid>https://www.akamai.com/blog/security/2023/sep/3-lessons-learned-from-successful-cyberattacks</guid>
	<pubDate>Fri, 22 Sep 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Unmasking a Sophisticated Phishing Campaign That Targets Hotel Guests</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/2023/sep/sophisticated-phishing-campaign-targeting-hospitality</link>
	<author>Shiran Guez</author>
	<guid>https://www.akamai.com/blog/security-research/2023/sep/sophisticated-phishing-campaign-targeting-hospitality</guid>
	<pubDate>Thu, 21 Sep 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Introducing Easy API Security Deployment</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2023/sep/introducing-easy-api-security-deployment</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/2023/sep/introducing-easy-api-security-deployment</guid>
	<pubDate>Thu, 21 Sep 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Prolexic Now Offers Cloud, On-Prem, and Hybrid DDoS Protection</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/akamai-prolexic-introduces-prolexic-on-prem-and-prolexic-hybrid</link>
	<author>Sandeep Rath</author>
	<guid>https://www.akamai.com/blog/security/akamai-prolexic-introduces-prolexic-on-prem-and-prolexic-hybrid</guid>
	<pubDate>Wed, 20 Sep 2023 09:30:00 UTC</pubDate>

</item>
<item>
	<title>How Account Opening Abuse Affects 6 Industries</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/how-account-opening-abuse-affects-6-industries</link>
	<author>David Sénécal</author>
	<guid>https://www.akamai.com/blog/security/how-account-opening-abuse-affects-6-industries</guid>
	<pubDate>Tue, 19 Sep 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on September’s Patch Tuesday 2023</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-september-2023</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-september-2023</guid>
	<pubDate>Fri, 15 Sep 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>PCI DSS v4: Uncovering Web Skimming Threats with Payment Integrations</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/pci-dss-v4-uncovering-web-skimming-threats-with-payment-integrations</link>
	<author>Boris Kirzner</author>
	<guid>https://www.akamai.com/blog/security/pci-dss-v4-uncovering-web-skimming-threats-with-payment-integrations</guid>
	<pubDate>Thu, 14 Sep 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Can't Be Contained: Finding a Command Injection Vulnerability in Kubernetes</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/kubernetes-critical-vulnerability-command-injection</link>
	<author>Tomer Peled</author>
	<guid>https://www.akamai.com/blog/security-research/kubernetes-critical-vulnerability-command-injection</guid>
	<pubDate>Wed, 13 Sep 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Choose Your Own Adventure — A Chat About the Future of Edge Computing </title>
	<description></description>
	<link>https://www.akamai.com/blog/edge/choose-your-own-adventure-the-future-of-edge-computing</link>
	<author>AJ Johnson</author>
	<guid>https://www.akamai.com/blog/edge/choose-your-own-adventure-the-future-of-edge-computing</guid>
	<pubDate>Mon, 11 Sep 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Increase Performance, Decrease Costs with a Flexible Distributed Cloud</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/increase-performance-decrease-costs-flexible-distributed-cloud</link>
	<author>Susan McReynolds</author>
	<guid>https://www.akamai.com/blog/cloud/increase-performance-decrease-costs-flexible-distributed-cloud</guid>
	<pubDate>Fri, 08 Sep 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Prevents the Largest DDoS Attack on a U.S. Financial Company</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/akamai-prevents-the-largest-ddos-attack-on-a-us-financial-company</link>
	<author>Craig Sparling &amp; Sandeep Rath</author>
	<guid>https://www.akamai.com/blog/security/akamai-prevents-the-largest-ddos-attack-on-a-us-financial-company</guid>
	<pubDate>Fri, 08 Sep 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Best Practices for Testing Akamai App &amp; API Protector</title>
	<description></description>
	<link>https://www.akamai.com/blog/edge/testing-akamai-app-and-api-protector</link>
	<author>Jonathan Carvalho</author>
	<guid>https://www.akamai.com/blog/edge/testing-akamai-app-and-api-protector</guid>
	<pubDate>Thu, 07 Sep 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>DGA Families with Dynamic Seeds: Unexpected Behavior in DNS Traffic</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/dga-dynamic-unexpected-behavior-in-dns</link>
	<author>Connor Faulkner &amp; Stijn Tilborghs</author>
	<guid>https://www.akamai.com/blog/security-research/dga-dynamic-unexpected-behavior-in-dns</guid>
	<pubDate>Wed, 06 Sep 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>3 Ways to Use Zero Trust to Reduce Cybercrime Risk in Healthcare</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/use-zero-trust-to-reduce-cybercrime-risk</link>
	<author>Carley Thornell</author>
	<guid>https://www.akamai.com/blog/security/use-zero-trust-to-reduce-cybercrime-risk</guid>
	<pubDate>Tue, 05 Sep 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Media IT Leaders Say Distributed Cloud Will Boost Performance, Lower Cost</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/media-it-leaders-say-distributed-cloud-will-boost-performance-lower-cost</link>
	<author>Todd Loewenstein</author>
	<guid>https://www.akamai.com/blog/cloud/media-it-leaders-say-distributed-cloud-will-boost-performance-lower-cost</guid>
	<pubDate>Fri, 01 Sep 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Understanding International Revenue Share Fraud</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/understanding-international-revenue-share-fraud</link>
	<author>Jagdish Mohite</author>
	<guid>https://www.akamai.com/blog/security/understanding-international-revenue-share-fraud</guid>
	<pubDate>Thu, 31 Aug 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Challenge of Securing APIs for a Luxury Hotel Chain</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/securing-apis-for-a-luxury-hotel-chain</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/securing-apis-for-a-luxury-hotel-chain</guid>
	<pubDate>Wed, 30 Aug 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>DDoS Attacks Surge Against Vulnerable Assets: Are You Prepared?</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/ddos-attacks-surge-against-vulnerable-assets</link>
	<author>Craig Sparling</author>
	<guid>https://www.akamai.com/blog/security/ddos-attacks-surge-against-vulnerable-assets</guid>
	<pubDate>Tue, 29 Aug 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>You Are a Woman in Tech: Own Your Voice</title>
	<description></description>
	<link>https://www.akamai.com/blog/culture/you-are-a-woman-in-tech-own-your-voice</link>
	<author>Tashema Nichols-Jones</author>
	<guid>https://www.akamai.com/blog/culture/you-are-a-woman-in-tech-own-your-voice</guid>
	<pubDate>Mon, 28 Aug 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Connecting Employees Through the Power of Reuse</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/connecting-employees-through-the-power-of-reuse</link>
	<author>Katie Robinson</author>
	<guid>https://www.akamai.com/blog/sustainability/connecting-employees-through-the-power-of-reuse</guid>
	<pubDate>Fri, 25 Aug 2023 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Safeguard Medical Devices: New H-ISAC Guidance on Cusp of FDA Rule</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/safeguard-medical-devices-new-h-isac-guidance-fda-rule</link>
	<author>Carley Thornell</author>
	<guid>https://www.akamai.com/blog/security/safeguard-medical-devices-new-h-isac-guidance-fda-rule</guid>
	<pubDate>Thu, 24 Aug 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>3 Steps to Elevate Your Cybersecurity in a Post-Pandemic World</title>
	<description>As cybercrime grows more sophisticated in the remote work era, you can take three essential steps to fortify your organization against evolving threats.</description>
	<link>https://www.akamai.com/blog/security/3-steps-elevate-cybersecurity-post-pandemic-world</link>
	<author>Sandeep Rath</author>
	<guid>https://www.akamai.com/blog/security/3-steps-elevate-cybersecurity-post-pandemic-world</guid>
	<pubDate>Wed, 23 Aug 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai World Tour 2023: Let’s Connect on Security and Cloud Innovation</title>
	<description></description>
	<link>https://www.akamai.com/blog/news/akamai-world-tour-2023</link>
	<author>Adam Karon &amp; Mani Sundaram</author>
	<guid>https://www.akamai.com/blog/news/akamai-world-tour-2023</guid>
	<pubDate>Tue, 22 Aug 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Develops Real-Time Detections for DNS Exfiltration</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/akamais-real-time-detections-for-dns-exfiltration</link>
	<author>Yarin Ozery</author>
	<guid>https://www.akamai.com/blog/security/akamais-real-time-detections-for-dns-exfiltration</guid>
	<pubDate>Thu, 17 Aug 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Defends Against the OWASP Top 10 API Security Risks</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/akamai-defends-against-owasp-top-10-api-security-risks</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/akamai-defends-against-owasp-top-10-api-security-risks</guid>
	<pubDate>Wed, 16 Aug 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Updated Kmsdx Binary Shows KmsdBot Is Targeting the IoT Landscape</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/updated-kmsdbot-binary-targeting-iot</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security-research/updated-kmsdbot-binary-targeting-iot</guid>
	<pubDate>Tue, 15 Aug 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Private Mobile Connectivity: More Visibility, Security, and Control</title>
	<description></description>
	<link>https://www.akamai.com/blog/edge/private-mobile-connectivity-more-visibility-security-control</link>
	<author>Sandra Murphy</author>
	<guid>https://www.akamai.com/blog/edge/private-mobile-connectivity-more-visibility-security-control</guid>
	<pubDate>Fri, 11 Aug 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Give Me an E, Give Me a T, Give Me a W. What Do You Get? RPC!</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/msrpc-defense-measures-in-windows-etw</link>
	<author>Stiv Kupchik</author>
	<guid>https://www.akamai.com/blog/security-research/msrpc-defense-measures-in-windows-etw</guid>
	<pubDate>Thu, 10 Aug 2023 08:30:00 UTC</pubDate>

</item>
<item>
	<title>Xurum: New Magento Campaign Discovered</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/new-sophisticated-magento-campaign-xurum-webshell</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/new-sophisticated-magento-campaign-xurum-webshell</guid>
	<pubDate>Wed, 09 Aug 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on August’s Patch Tuesday 2023</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-august-2023</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-august-2023</guid>
	<pubDate>Wed, 09 Aug 2023 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Ransomware on the Move: Evolving Exploitation Techniques and the Active Pursuit of Zero-Days</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/ransomware-on-the-move-evolving-exploitation-techniques</link>
	<author>Akamai Security Intelligence Group &amp; Steve Winterfeld</author>
	<guid>https://www.akamai.com/blog/security-research/ransomware-on-the-move-evolving-exploitation-techniques</guid>
	<pubDate>Mon, 07 Aug 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>A Distributed Cloud Platform Is a Priority for Gaming IT Leaders</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/distributed-cloud-platform-priority-for-gaming-it-leaders</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/cloud/distributed-cloud-platform-priority-for-gaming-it-leaders</guid>
	<pubDate>Fri, 04 Aug 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>A CEO’s Perspective: Data Transfer Is the Silent Killer</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/data-transfer-is-the-silent-killer</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/cloud/data-transfer-is-the-silent-killer</guid>
	<pubDate>Thu, 03 Aug 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Protect Every API Anywhere with API Security</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/protect-every-api-anywhere-with-api-security</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/protect-every-api-anywhere-with-api-security</guid>
	<pubDate>Wed, 02 Aug 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Power of Proximity: Local DDoS Scrubbing Centers Enhance Security</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/the-power-of-proximity-local-ddos-scrubbing-centers-enhance-security</link>
	<author>Haru Kaneko</author>
	<guid>https://www.akamai.com/blog/security/the-power-of-proximity-local-ddos-scrubbing-centers-enhance-security</guid>
	<pubDate>Fri, 28 Jul 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Never-Ending Phishing Scam: When “Natalie Hamilton” Reemerged with a Vengeance (and Power Drill)</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/never-ending-sophisticated-phishing-scam-campaign</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security-research/never-ending-sophisticated-phishing-scam-campaign</guid>
	<pubDate>Thu, 27 Jul 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>The Increased Use of Mobile Devices Expands the Threat Landscape</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/increased-use-mobile-devices-expands-threat-landscape</link>
	<author>Or Katz &amp; Victoria Ward</author>
	<guid>https://www.akamai.com/blog/security/increased-use-mobile-devices-expands-threat-landscape</guid>
	<pubDate>Wed, 26 Jul 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Why It’s Important to Make Tech More Accessible </title>
	<description></description>
	<link>https://www.akamai.com/blog/culture/why-its-important-to-make-tech-more-accessible</link>
	<author>Tashema Nichols-Jones</author>
	<guid>https://www.akamai.com/blog/culture/why-its-important-to-make-tech-more-accessible</guid>
	<pubDate>Tue, 25 Jul 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Identifying a DNS Exfiltration Attack That Wasn’t Real — This Time</title>
	<description> A recent red team DNS exfiltration alert confirms that Akamai Secure Internet Access is an effective security tool for this type of detection and analysis.</description>
	<link>https://www.akamai.com/blog/security/identifying-dns-exfiltration-attack-that-wasnt-real-this-time</link>
	<author>Moshe Cohen</author>
	<guid>https://www.akamai.com/blog/security/identifying-dns-exfiltration-attack-that-wasnt-real-this-time</guid>
	<pubDate>Mon, 24 Jul 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>ZEROgrid: A Dependable, Cost-Effective, Low-Emission Power System</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/zerogrid-a-dependable-low-emission-power-system</link>
	<author>Mike Mattera</author>
	<guid>https://www.akamai.com/blog/sustainability/zerogrid-a-dependable-low-emission-power-system</guid>
	<pubDate>Fri, 21 Jul 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Multiple Extortion: An Existential Threat</title>
	<description>Explore effective strategies and comprehensive cybersecurity measures to protect your organization’s data from increasingly sophisticated cybercrimes.</description>
	<link>https://www.akamai.com/blog/security/multiple-extortion-existential-threat</link>
	<author>Sven Dummer</author>
	<guid>https://www.akamai.com/blog/security/multiple-extortion-existential-threat</guid>
	<pubDate>Thu, 20 Jul 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Exploiting SteelSeries' Subapplication Mechanism for Privilege Escalation</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/exploit-steelseries-subapp-privilege-escalation</link>
	<author>Tomer Peled</author>
	<guid>https://www.akamai.com/blog/security-research/exploit-steelseries-subapp-privilege-escalation</guid>
	<pubDate>Wed, 19 Jul 2023 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Adopting Comprehensive API Security Falls Behind Need</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/adopting-comprehensive-api-security-falls-behind-need</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/adopting-comprehensive-api-security-falls-behind-need</guid>
	<pubDate>Tue, 18 Jul 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on July’s Patch Tuesday 2023</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-july-2023</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-july-2023</guid>
	<pubDate>Fri, 14 Jul 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Aging-in-Place: Why HCIT Professionals Should Adopt  Zero Trust Security </title>
	<description></description>
	<link>https://www.akamai.com/blog/security/hcit-professionals-should-adopt-zero-trust-security</link>
	<author>Carley Thornell</author>
	<guid>https://www.akamai.com/blog/security/hcit-professionals-should-adopt-zero-trust-security</guid>
	<pubDate>Fri, 14 Jul 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>(Micro)Segmentation from a Practical Perspective</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/segmentation-from-a-practical-perspective</link>
	<author>Stiv Kupchik</author>
	<guid>https://www.akamai.com/blog/security-research/segmentation-from-a-practical-perspective</guid>
	<pubDate>Thu, 13 Jul 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Charting a Course for the Modern Cloud</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/charting-a-course-for-the-modern-cloud</link>
	<author>Adam Karon</author>
	<guid>https://www.akamai.com/blog/cloud/charting-a-course-for-the-modern-cloud</guid>
	<pubDate>Wed, 12 Jul 2023 10:30:00 UTC</pubDate>

</item>
<item>
	<title>Conquering Adversarial Bots and Humans to Prevent Account Takeovers</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/conquering-adversarial-bots-and-humans</link>
	<author>Ryan Gao &amp; Brett Hickinbotham</author>
	<guid>https://www.akamai.com/blog/security/conquering-adversarial-bots-and-humans</guid>
	<pubDate>Fri, 07 Jul 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Multicloud Strategies Must Evolve to Meet the Needs of Global IT Leaders</title>
	<description>In a Forrester study commissioned by Akamai, global IT leaders explain why they are adopting cloud-native architecture and distributing apps and workloads.</description>
	<link>https://www.akamai.com/blog/cloud/multicloud-strategies-must-evolve</link>
	<author>Mike Maney</author>
	<guid>https://www.akamai.com/blog/cloud/multicloud-strategies-must-evolve</guid>
	<pubDate>Wed, 05 Jul 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Why Open Enrollment Readiness Should Be a Year-Round Strategy</title>
	<description>Today’s malicious actors see the healthcare industry as a target-rich environment, so getting ready for open enrollment should be a year-round process.</description>
	<link>https://www.akamai.com/blog/security/why-open-enrollment-readiness-should-be-year-round-strategy</link>
	<author>Carley Thornell</author>
	<guid>https://www.akamai.com/blog/security/why-open-enrollment-readiness-should-be-year-round-strategy</guid>
	<pubDate>Mon, 03 Jul 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>As Phishing Websites Flourish, Brands Seek Protection from Impersonation</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/brands-seek-protection-from-impersonation</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/brands-seek-protection-from-impersonation</guid>
	<pubDate>Fri, 30 Jun 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>3 Ways for Financial Institutions to Fight Account Takeover Fraud</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/ways-financial-institutions-can-fight-account-takeover-fraud</link>
	<author>Cheryl Chiodi</author>
	<guid>https://www.akamai.com/blog/security/ways-financial-institutions-can-fight-account-takeover-fraud</guid>
	<pubDate>Thu, 29 Jun 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Proxyjacking: The Latest Cybercriminal Side Hustle </title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/proxyjacking-new-campaign-cybercriminal-side-hustle</link>
	<author>Allen West</author>
	<guid>https://www.akamai.com/blog/security-research/proxyjacking-new-campaign-cybercriminal-side-hustle</guid>
	<pubDate>Thu, 29 Jun 2023 07:30:00 UTC</pubDate>

</item>
<item>
	<title>The L in Linux Stands for Lateral Movement</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/linux-lateral-movement-more-than-ssh</link>
	<author>Stiv Kupchik</author>
	<guid>https://www.akamai.com/blog/security-research/linux-lateral-movement-more-than-ssh</guid>
	<pubDate>Wed, 28 Jun 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Inclusion in Tech: Discover Diverse Career Paths for Women in Tech</title>
	<description>Hema Patel discusses inclusive career paths, cancel culture in the workplace, and defying the traditional education limitations for women in tech.</description>
	<link>https://www.akamai.com/blog/culture/inclusion-in-tech-discover-diverse-career-paths</link>
	<author>Tashema Nichols-Jones</author>
	<guid>https://www.akamai.com/blog/culture/inclusion-in-tech-discover-diverse-career-paths</guid>
	<pubDate>Tue, 27 Jun 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Navigating a New Reality: Content Personalization at Scale</title>
	<description>Prioritizing content personalization can improve user engagement, enhance customer experiences, and boost revenue on a global scale.</description>
	<link>https://www.akamai.com/blog/edge/navigating-new-reality-content-personalization-at-scale</link>
	<author>Shane Keats </author>
	<guid>https://www.akamai.com/blog/edge/navigating-new-reality-content-personalization-at-scale</guid>
	<pubDate>Thu, 22 Jun 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>OWASP Top 10 API Security Risks: The 2023 Edition Is Finally Here</title>
	<description>We review the final changes in the 2023 update to the OWASP Top 10 API Security Risks to help you on your journey to secure your APIs.</description>
	<link>https://www.akamai.com/blog/security/owasp-top-10-api-security-risks-2023-edition</link>
	<author>Mike Elissen &amp; Nitzan Namer</author>
	<guid>https://www.akamai.com/blog/security/owasp-top-10-api-security-risks-2023-edition</guid>
	<pubDate>Wed, 21 Jun 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai SIRT Security Advisory: CVE-2023-26801 Exploited to Spread Mirai Botnet Malware</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/cve-2023-26801-exploited-spreading-mirai-botnet</link>
	<author>Akamai SIRT</author>
	<guid>https://www.akamai.com/blog/security-research/cve-2023-26801-exploited-spreading-mirai-botnet</guid>
	<pubDate>Wed, 21 Jun 2023 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Named a Leader in IDC MarketScape for Network Edge Security as a Service</title>
	<description>Akamai was named a Leader in the IDC MarketScape for delivering cloud security without performance trade-offs via our mature application security portfolio.</description>
	<link>https://www.akamai.com/blog/security/akamai-named-leader-idc-marketscape-network-edge-security-service</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/akamai-named-leader-idc-marketscape-network-edge-security-service</guid>
	<pubDate>Wed, 21 Jun 2023 09:00:00 UTC</pubDate>

</item>
<item>
	<title>Script Security: Achieving PCI DSS v4 Compliance Before the Deadline</title>
	<description>The new Akamai Page Integrity Manager capabilities are purpose-built to address the latest PCI DSS v4.0 script requirements with one comprehensive tool.</description>
	<link>https://www.akamai.com/blog/security/script-security-achieving-pci-dss-v4-compliance-before-deadline</link>
	<author>Emily Lyons</author>
	<guid>https://www.akamai.com/blog/security/script-security-achieving-pci-dss-v4-compliance-before-deadline</guid>
	<pubDate>Wed, 14 Jun 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Entering Through the Gift Shop: Attacks on Commerce</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/entering-the-gift-shop-attacks-on-commerce</link>
	<author>Badette Tribbey &amp; Steve Winterfeld</author>
	<guid>https://www.akamai.com/blog/security-research/entering-the-gift-shop-attacks-on-commerce</guid>
	<pubDate>Tue, 13 Jun 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on June’s Patch Tuesday 2023</title>
	<description>Every Patch Tuesday stirs up the community. See Akamai's insights and recommendations on what to focus on, and patch, patch, patch!</description>
	<link>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-june-2023</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-june-2023</guid>
	<pubDate>Tue, 13 Jun 2023 09:00:00 UTC</pubDate>

</item>
<item>
	<title>Future Growth Relies on Channel Partners</title>
	<description></description>
	<link>https://www.akamai.com/blog/partners/2023/jun/future-growth-relies-on-channel-partners</link>
	<author>Preeti Alphonso</author>
	<guid>https://www.akamai.com/blog/partners/2023/jun/future-growth-relies-on-channel-partners</guid>
	<pubDate>Fri, 09 Jun 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Deploying Harper and Akamai Cloud for Faster API Performance</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/deploy-harperdb-akamai-connected-cloud-faster-api-performance</link>
	<author>Michael King</author>
	<guid>https://www.akamai.com/blog/cloud/deploy-harperdb-akamai-connected-cloud-faster-api-performance</guid>
	<pubDate>Thu, 08 Jun 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>MOVEit SQLi Zero-Day (CVE-2023-34362) Exploited by CL0P Ransomware Group</title>
	<description>Akamai Security Intelligence Group, which has been examining the MOVEit vulnerability and its exploitation, provides recommendations for detection and mitigation.</description>
	<link>https://www.akamai.com/blog/security-research/moveit-sqli-zero-day-exploit-clop-ransomware</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/moveit-sqli-zero-day-exploit-clop-ransomware</guid>
	<pubDate>Thu, 08 Jun 2023 09:00:00 UTC</pubDate>

</item>
<item>
	<title>Analyzing Broken User Authentication Threats to JSON Web Tokens</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/owasp-authentication-threats-for-json-web-token</link>
	<author>Nitzan Namer</author>
	<guid>https://www.akamai.com/blog/security-research/owasp-authentication-threats-for-json-web-token</guid>
	<pubDate>Wed, 07 Jun 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>New Magecart-Style Campaign Abusing Legitimate Websites to Attack Others</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/new-magecart-hides-behind-legit-domains</link>
	<author>Roman Lvovsky</author>
	<guid>https://www.akamai.com/blog/security-research/new-magecart-hides-behind-legit-domains</guid>
	<pubDate>Thu, 01 Jun 2023 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Deliver Fast, Reliable, and Secure Web Experiences with HTTP/3</title>
	<description></description>
	<link>https://www.akamai.com/blog/performance/deliver-fast-reliable-secure-web-experiences-http3</link>
	<author>Julio Chaves Herrera</author>
	<guid>https://www.akamai.com/blog/performance/deliver-fast-reliable-secure-web-experiences-http3</guid>
	<pubDate>Wed, 31 May 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Exploring Three Remote Code Execution  Vulnerabilities in RPC Runtime</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/rpc-runtime-exploring-three-vulnerabilities</link>
	<author>Ben Barnea</author>
	<guid>https://www.akamai.com/blog/security-research/rpc-runtime-exploring-three-vulnerabilities</guid>
	<pubDate>Fri, 26 May 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/dark-frost-botnet-unexpected-author-profile</link>
	<author>Allen West</author>
	<guid>https://www.akamai.com/blog/security-research/dark-frost-botnet-unexpected-author-profile</guid>
	<pubDate>Thu, 25 May 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: May 2023  </title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/whats-new-for-developers-may-2023</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/whats-new-for-developers-may-2023</guid>
	<pubDate>Wed, 24 May 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Today’s Top 4 IT Investment Trends Across the Healthcare Ecosystem</title>
	<description></description>
	<link>https://www.akamai.com/blog/news/top-4-it-investment-trends-healthcare-ecosystem</link>
	<author>Carley Thornell</author>
	<guid>https://www.akamai.com/blog/news/top-4-it-investment-trends-healthcare-ecosystem</guid>
	<pubDate>Tue, 23 May 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Powering and Protecting Life Online with Nature-Positive Action</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/powering-life-online-with-nature-positive-action</link>
	<author>Katie Robinson</author>
	<guid>https://www.akamai.com/blog/sustainability/powering-life-online-with-nature-positive-action</guid>
	<pubDate>Mon, 22 May 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How Technology Changes the Landscape of Our Lives</title>
	<description></description>
	<link>https://www.akamai.com/blog/culture/how-technology-changes-landscape-of-lives</link>
	<author>Tashema Nichols-Jones</author>
	<guid>https://www.akamai.com/blog/culture/how-technology-changes-landscape-of-lives</guid>
	<pubDate>Thu, 18 May 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>CVEs: What They Are, and Ways to Mitigate Their Impact</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/cves-what-they-are-ways-to-mitigate-their-impact</link>
	<author>Jacob Abrams</author>
	<guid>https://www.akamai.com/blog/security/cves-what-they-are-ways-to-mitigate-their-impact</guid>
	<pubDate>Tue, 16 May 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Today’s Evolving Cloud Strategies Are Embracing Distributed Computing</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/todays-evolving-cloud-strategies-embracing-distributed-computing</link>
	<author>Liam Eagle</author>
	<guid>https://www.akamai.com/blog/cloud/todays-evolving-cloud-strategies-embracing-distributed-computing</guid>
	<pubDate>Thu, 11 May 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Race to Patch: Attackers Leverage Sample Exploit Code in WordPress Plug-in</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/attackers-leverage-sample-exploit-wordpress-plugin</link>
	<author>Ryan Barnett</author>
	<guid>https://www.akamai.com/blog/security-research/attackers-leverage-sample-exploit-wordpress-plugin</guid>
	<pubDate>Thu, 11 May 2023 09:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on May’s Patch Tuesday 2023</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-may-2023</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-may-2023</guid>
	<pubDate>Thu, 11 May 2023 05:00:00 UTC</pubDate>

</item>
<item>
	<title>From One Vulnerability to Another: Outlook Patch Analysis Reveals Important Flaw in Windows API</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/important-outlook-vulnerability-bypass-windows-api</link>
	<author>Ben Barnea</author>
	<guid>https://www.akamai.com/blog/security-research/important-outlook-vulnerability-bypass-windows-api</guid>
	<pubDate>Wed, 10 May 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Hot Topics at Healthcare Conferences: From AI to Cyber Insurance Costs</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/hot-topics-at-healthcare-conferences</link>
	<author>Carley Thornell</author>
	<guid>https://www.akamai.com/blog/security/hot-topics-at-healthcare-conferences</guid>
	<pubDate>Thu, 04 May 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Integrates DNS Security with Microsoft's Azure Firewall to Protect Cloud Workloads</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/akamai-integrates-dns-security-microsofts-azure-firewall</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/akamai-integrates-dns-security-microsofts-azure-firewall</guid>
	<pubDate>Wed, 03 May 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>AkaRank: Improving Popularity Rankings for Better Threat Intelligence, Part 2</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/improving-threat-intelligence-part-2-introducing-akarank</link>
	<author>Noy Aizenberg &amp; Congcong Xing</author>
	<guid>https://www.akamai.com/blog/security/improving-threat-intelligence-part-2-introducing-akarank</guid>
	<pubDate>Tue, 02 May 2023 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Zero Trust: Better Cybersecurity Insurance and Lower Healthcare Costs</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/zero-trust-better-cybersecurity-insurance-lower-healthcare-costs</link>
	<author>Carley Thornell &amp; Tony Lauro</author>
	<guid>https://www.akamai.com/blog/cloud/zero-trust-better-cybersecurity-insurance-lower-healthcare-costs</guid>
	<pubDate>Mon, 01 May 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Render Pages Faster for Optimized Browsing, Part 5 of 5</title>
	<description>Find out what happens once the browser has downloaded usable assets and it's time to display something on-screen.</description>
	<link>https://www.akamai.com/blog/developers/render-pages-faster-optimized-browsing-part-5-of-5</link>
	<author>Akamai Edge Delivery Product Marketing</author>
	<guid>https://www.akamai.com/blog/developers/render-pages-faster-optimized-browsing-part-5-of-5</guid>
	<pubDate>Fri, 28 Apr 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai and the Adoption of Post-Quantum Cryptography</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/akamai-and-post-quantum-cryptography</link>
	<author>David Rivera &amp; Jan Schaumann</author>
	<guid>https://www.akamai.com/blog/security/akamai-and-post-quantum-cryptography</guid>
	<pubDate>Thu, 27 Apr 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Prolexic Now Comes With a Network Cloud Firewall</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/akamai-prolexic-comes-with-network-cloud-firewall</link>
	<author>Sven Dummer</author>
	<guid>https://www.akamai.com/blog/security/akamai-prolexic-comes-with-network-cloud-firewall</guid>
	<pubDate>Tue, 25 Apr 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Our Journey with FlexBase Emissions</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/journey-flexbase-emissions</link>
	<author>Katie Robinson</author>
	<guid>https://www.akamai.com/blog/sustainability/journey-flexbase-emissions</guid>
	<pubDate>Tue, 25 Apr 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Brand Guardian Solves the Growing Problem of Impersonation Attacks</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/akamai-brand-protector-solves-impersonation-attacks</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/akamai-brand-protector-solves-impersonation-attacks</guid>
	<pubDate>Mon, 24 Apr 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: April 2023</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/whats-new-for-developers-april-2023</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/whats-new-for-developers-april-2023</guid>
	<pubDate>Fri, 21 Apr 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Embracing Change with Akamai Connected Cloud</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/embracing-change-with-akamai-connected-cloud</link>
	<author>Mike Mattera</author>
	<guid>https://www.akamai.com/blog/sustainability/embracing-change-with-akamai-connected-cloud</guid>
	<pubDate>Fri, 21 Apr 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Announces Advanced Bot Detections, Global Recognition of Entities</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/akamai-announces-advanced-bot-detections</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/akamai-announces-advanced-bot-detections</guid>
	<pubDate>Thu, 20 Apr 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Phishing: The Oldest and Wisest Attack Vector</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/phishing-oldest-wisest-attack-vector</link>
	<author>Jim Black &amp; Or Katz</author>
	<guid>https://www.akamai.com/blog/security/phishing-oldest-wisest-attack-vector</guid>
	<pubDate>Wed, 19 Apr 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Slipping Through the Security Gaps: The Rise of Application and API Attacks</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/the-rise-of-application-and-api-attacks</link>
	<author>Badette Tribbey &amp; Steve Winterfeld</author>
	<guid>https://www.akamai.com/blog/security-research/the-rise-of-application-and-api-attacks</guid>
	<pubDate>Tue, 18 Apr 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Simplify Access Security: Integrate ZTNA with Your Cloud Identity Solution</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/simplify-access-security-integrate-ztna</link>
	<author>Sanjay Sadarangani</author>
	<guid>https://www.akamai.com/blog/security/simplify-access-security-integrate-ztna</guid>
	<pubDate>Mon, 17 Apr 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Foundation: Our Values in Action in 2022</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/akamai-foundation-our-values-in-action-2022</link>
	<author>Natalie Billingham</author>
	<guid>https://www.akamai.com/blog/sustainability/akamai-foundation-our-values-in-action-2022</guid>
	<pubDate>Fri, 14 Apr 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on April’s Patch Tuesday 2023</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-april-2023</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-april-2023</guid>
	<pubDate>Fri, 14 Apr 2023 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Investigating the resurgence of the Mexals campaign</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/mexals-cryptojacking-malware-resurgence</link>
	<author>Stiv Kupchik</author>
	<guid>https://www.akamai.com/blog/security-research/mexals-cryptojacking-malware-resurgence</guid>
	<pubDate>Wed, 12 Apr 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Get More from Your Player Analytics and CDN Logs with CMCD</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/get-your-player-analytics-with-cmcd</link>
	<author>Will Law</author>
	<guid>https://www.akamai.com/blog/cloud/get-your-player-analytics-with-cmcd</guid>
	<pubDate>Tue, 11 Apr 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s 2022 ESG Impact Report</title>
	<description></description>
	<link>https://www.akamai.com/blog/sustainability/akamai-2022-esg-impact-report</link>
	<author>Aaron Ahola</author>
	<guid>https://www.akamai.com/blog/sustainability/akamai-2022-esg-impact-report</guid>
	<pubDate>Tue, 11 Apr 2023 11:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Be Prepared in the Age of Cyber Insecurity</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/preparation-in-the-age-of-cyber-insecurity</link>
	<author>Marta Fydrych-Gasowska</author>
	<guid>https://www.akamai.com/blog/security/preparation-in-the-age-of-cyber-insecurity</guid>
	<pubDate>Fri, 07 Apr 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Hacktivists Return with DDoS Attacks, and Their Eyes on European Banks</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/hacktivists-return-with-ddos-attacks</link>
	<author>Cheryl Chiodi</author>
	<guid>https://www.akamai.com/blog/security/hacktivists-return-with-ddos-attacks</guid>
	<pubDate>Wed, 05 Apr 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Managed Security Service: New Expert Help to Protect from Attacks</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/akamai-managed-security-protect-from-attacks</link>
	<author>Stacey Sweeney</author>
	<guid>https://www.akamai.com/blog/security/akamai-managed-security-protect-from-attacks</guid>
	<pubDate>Tue, 04 Apr 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How Can We Satisfy the Cloud Needs of SaaS?</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/satisfying-the-cloud-needs-of-saas</link>
	<author>Warren Parti </author>
	<guid>https://www.akamai.com/blog/cloud/satisfying-the-cloud-needs-of-saas</guid>
	<pubDate>Fri, 31 Mar 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Improving the Gamer Experience with Low-Latency Microservices</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/improving-gamer-experience-with-low-latency-microservices</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/cloud/improving-gamer-experience-with-low-latency-microservices</guid>
	<pubDate>Thu, 30 Mar 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Most Common Combosquatting Keyword Is “Support”</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/combosquatting-keyword-analysis-support</link>
	<author>Stijn Tilborghs &amp; Kamil Jarosz</author>
	<guid>https://www.akamai.com/blog/security-research/combosquatting-keyword-analysis-support</guid>
	<pubDate>Wed, 29 Mar 2023 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Why a Distributed Cloud Is Perfect for Streaming</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/why-distributed-cloud-is-perfect-for-streaming</link>
	<author>Shane Keats </author>
	<guid>https://www.akamai.com/blog/cloud/why-distributed-cloud-is-perfect-for-streaming</guid>
	<pubDate>Tue, 28 Mar 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: March 2023</title>
	<description></description>
	<link>https://www.akamai.com/blog/developers/whats-new-for-developers-march-2023</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/whats-new-for-developers-march-2023</guid>
	<pubDate>Fri, 24 Mar 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What Is Cloud Architecture?</title>
	<description>What is cloud architecture? And what types of clouds are there? Cloud architecture defines how all the components that enable cloud computing come together.
</description>
	<link>https://www.akamai.com/blog/cloud/what-is-cloud-architecture</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/cloud/what-is-cloud-architecture</guid>
	<pubDate>Thu, 23 Mar 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What the NIS2 Directive Means for Your Business and Your APIs</title>
	<description>Learn how implementing a comprehensive cybersecurity program that addresses all aspects of API security can ensure compliance with the NIS2 Directive.</description>
	<link>https://www.akamai.com/blog/security/2024/sep/what-the-nis2-directive-means-for-your-business-and-your-apis</link>
	<author>Steven Duckaert</author>
	<guid>https://www.akamai.com/blog/security/2024/sep/what-the-nis2-directive-means-for-your-business-and-your-apis</guid>
	<pubDate>Thu, 23 Mar 2023 00:25:00 UTC</pubDate>

</item>
<item>
	<title>Chatbots, Celebrities, and Victim Retargeting: Why Crypto Giveaway Scams Are Still So Successful</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/crypto-giveaway-scams-are-still-successful</link>
	<author>Shiran Guez</author>
	<guid>https://www.akamai.com/blog/security-research/crypto-giveaway-scams-are-still-successful</guid>
	<pubDate>Wed, 22 Mar 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Defeating Triple Extortion Ransomware: The Potent Combo of Ransomware and DDoS Attacks </title>
	<description>Protect your organization from triple extortion ransomware – the devastating combination of ransomware and a DDoS attack – with these four steps.</description>
	<link>https://www.akamai.com/blog/security/defeating-triple-extortion-ransomware</link>
	<author>Venkat Praneeth Nangineni &amp; Steve Winterfeld</author>
	<guid>https://www.akamai.com/blog/security/defeating-triple-extortion-ransomware</guid>
	<pubDate>Tue, 21 Mar 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What Proposed New Changes in the OWASP API Security Top 10 Mean for You</title>
	<description>The new OWASP Top 10 for API Security release candidate is a fantastic step in an API-specific direction, emphasizing the distinct nature of API threats.</description>
	<link>https://www.akamai.com/blog/security/proposed-new-changes-in-owasp-api-security</link>
	<author>Alex Marks-Bluth &amp; Nitzan Namer</author>
	<guid>https://www.akamai.com/blog/security/proposed-new-changes-in-owasp-api-security</guid>
	<pubDate>Mon, 20 Mar 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Preparing for the Multicloud Future</title>
	<description>Take advantage of multicloud flexibility to reduce risk, match spend to your current needs, and increase the pace of innovation.</description>
	<link>https://www.akamai.com/blog/cloud/preparing-for-multicloud-future</link>
	<author>Dave McCarthy</author>
	<guid>https://www.akamai.com/blog/cloud/preparing-for-multicloud-future</guid>
	<pubDate>Fri, 17 Mar 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on March’s Patch Tuesday 2023</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-march-2023</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-march-2023</guid>
	<pubDate>Fri, 17 Mar 2023 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Uncovering HinataBot: A Deep Dive into a Go-Based Threat</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/hinatabot-uncovering-new-golang-ddos-botnet</link>
	<author>Chad Seaman, Larry Cashdollar &amp; Allen West</author>
	<guid>https://www.akamai.com/blog/security-research/hinatabot-uncovering-new-golang-ddos-botnet</guid>
	<pubDate>Thu, 16 Mar 2023 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Introducing MDBR+: Customized Security for Government Organizations</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/introducing-mdbr-customized-security-for-government-organizations</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/introducing-mdbr-customized-security-for-government-organizations</guid>
	<pubDate>Wed, 15 Mar 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Attack Superhighway: A Deep Dive on Malicious DNS Traffic</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/a-deep-dive-on-malicious-dns-traffic</link>
	<author>Badette Tribbey &amp; Steve Winterfeld</author>
	<guid>https://www.akamai.com/blog/security-research/a-deep-dive-on-malicious-dns-traffic</guid>
	<pubDate>Tue, 14 Mar 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>DDoS Attacks in 2022: Targeting Everything Online, All at Once</title>
	<description>There was a big shift in DDoS targeting in 2022. Perhaps the most significant lesson learned: DDoS attackers are targeting everything, sometimes all at once.</description>
	<link>https://www.akamai.com/blog/security/ddos-attacks-in-2022-targeting-everything-online</link>
	<author>Dennis Birchard</author>
	<guid>https://www.akamai.com/blog/security/ddos-attacks-in-2022-targeting-everything-online</guid>
	<pubDate>Fri, 10 Mar 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Normalizing Women in Tech with Intentionality</title>
	<description>Vice President Simone Stewart kicks off our Akamai “Women In Tech” blog series and discusses how intentionality can cultivate a more inclusive environment. </description>
	<link>https://www.akamai.com/blog/culture/normalizing-women-in-tech-with-intentionality</link>
	<author>Tashema Nichols-Jones</author>
	<guid>https://www.akamai.com/blog/culture/normalizing-women-in-tech-with-intentionality</guid>
	<pubDate>Thu, 09 Mar 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Mitigates Record DDoS Attack in Asia-Pacific (900 Gbps)</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/record-breaking-ddos-in-apac</link>
	<author>Craig Sparling</author>
	<guid>https://www.akamai.com/blog/security/record-breaking-ddos-in-apac</guid>
	<pubDate>Wed, 08 Mar 2023 08:00:00 UTC</pubDate>

</item>
<item>
	<title>Introducing Akamai Hunt to Stop the Most Evasive Threats and Risks </title>
	<description></description>
	<link>https://www.akamai.com/blog/security/akamai-hunt-mitigates-most-evasive-threats</link>
	<author>Ravit Greitser</author>
	<guid>https://www.akamai.com/blog/security/akamai-hunt-mitigates-most-evasive-threats</guid>
	<pubDate>Tue, 07 Mar 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Changing Healthcare Delivery Requires Evolving Security Strategies</title>
	<description></description>
	<link>https://www.akamai.com/blog/news/changing-healthcare-delivery-requires-evolving-security-strategies</link>
	<author>Carley Thornell</author>
	<guid>https://www.akamai.com/blog/news/changing-healthcare-delivery-requires-evolving-security-strategies</guid>
	<pubDate>Thu, 02 Mar 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Cloud Computing Services Pricing Update</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/akamai-cloud-computing-price-update</link>
	<author>Shawn Michels</author>
	<guid>https://www.akamai.com/blog/cloud/akamai-cloud-computing-price-update</guid>
	<pubDate>Wed, 01 Mar 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Healthcare Organizations Must Balance Cybersecurity with Other Priorities</title>
	<description>Porter Research finds that today’s healthcare organizations must balance investments in data protection with resources they need to provide high-quality care.</description>
	<link>https://www.akamai.com/blog/security/healthcare-organizations-must-balance-cybersecurity-with-other-priorities</link>
	<author>Carley Thornell</author>
	<guid>https://www.akamai.com/blog/security/healthcare-organizations-must-balance-cybersecurity-with-other-priorities</guid>
	<pubDate>Mon, 27 Feb 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Deliver Faster Downloads for Better Browsing, Part 4 of 5</title>
	<description>Web browsers read HTML, CSS, and JavaScript code as well as video, images, and SVG files, then use that data to build and render a web page. 
</description>
	<link>https://www.akamai.com/blog/developers/deliver-faster-downloads-for-better-browsing-part-4-of-5</link>
	<author>Akamai Edge Delivery Product Marketing</author>
	<guid>https://www.akamai.com/blog/developers/deliver-faster-downloads-for-better-browsing-part-4-of-5</guid>
	<pubDate>Fri, 24 Feb 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>The Evolution of DDoS in Financial Services — Much More than a Nuisance</title>
	<description>Cyberattacks cost an average of 50% more for financial institutions than for firms in all other industries combined — and they continue to evolve.</description>
	<link>https://www.akamai.com/blog/security/evolution-ddos-financial-services</link>
	<author>Cheryl Chiodi</author>
	<guid>https://www.akamai.com/blog/security/evolution-ddos-financial-services</guid>
	<pubDate>Thu, 23 Feb 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Fantastic RPC Interfaces and How to Find Them</title>
	<description>Looking for your next security research project? Our RPC Interface Analyzer tool can help you find it.</description>
	<link>https://www.akamai.com/blog/security-research/rpc-toolkit-fantastic-interfaces-how-to-find</link>
	<author>Oryan De Paz</author>
	<guid>https://www.akamai.com/blog/security-research/rpc-toolkit-fantastic-interfaces-how-to-find</guid>
	<pubDate>Wed, 22 Feb 2023 15:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: February 2023</title>
	<description>Read about the most recent updates to EdgeWorkers, two new Postman collections, and Terraform Provider v3.3.0 — and find out how to sign up for betas.</description>
	<link>https://www.akamai.com/blog/developers/whats-new-for-developers-february-2023</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/whats-new-for-developers-february-2023</guid>
	<pubDate>Tue, 21 Feb 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Differentiated Cloud Strategy</title>
	<description>Akamai is taking a different approach to cloud computing than providers who base their platforms solely on core data centers. Read more about our strategy.</description>
	<link>https://www.akamai.com/blog/cloud/akamai-differentiated-cloud-strategy</link>
	<author>Tom Leighton</author>
	<guid>https://www.akamai.com/blog/cloud/akamai-differentiated-cloud-strategy</guid>
	<pubDate>Tue, 21 Feb 2023 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on February’s Patch Tuesday 2023</title>
	<description>Every Patch Tuesday stirs up the community. Read Akamai's insights and recommendations for February 2023. Learn what to focus on, and patch, patch, patch!</description>
	<link>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-february-2023</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-february-2023</guid>
	<pubDate>Fri, 17 Feb 2023 06:00:00 UTC</pubDate>

</item>
<item>
	<title>IDC MarketScape Names Akamai a Contender in Worldwide Public Cloud IaaS</title>
	<description>Akamai’s inclusion as a Contender in the "IDC MarketScape: Worldwide Public Cloud Infrastructure as a Service Vendor Assessment" demonstrates the strength of our cloud computing services.</description>
	<link>https://www.akamai.com/blog/cloud/idc-marketscape-names-akamai-a-contender</link>
	<author>Eric Francis</author>
	<guid>https://www.akamai.com/blog/cloud/idc-marketscape-names-akamai-a-contender</guid>
	<pubDate>Thu, 16 Feb 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Magecart Attack Disguised as Google Tag Manager</title>
	<description>Magecart skimmers constantly evolve. Recent attacks aimed at stealing sensitive customer information illustrate the need for comprehensive security solutions.</description>
	<link>https://www.akamai.com/blog/security/magecart-attack-disguised-as-google-tag-manager</link>
	<author>Roman Lvovsky</author>
	<guid>https://www.akamai.com/blog/security/magecart-attack-disguised-as-google-tag-manager</guid>
	<pubDate>Wed, 15 Feb 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Connected Cloud: The World’s Most Distributed Cloud Platform</title>
	<description>Introducing Akamai Connected Cloud, the massively distributed edge and cloud platform for cloud computing, security, and content delivery.</description>
	<link>https://www.akamai.com/blog/cloud/akamai-connected-cloud-most-distributed-cloud-platform</link>
	<author>Adam Karon</author>
	<guid>https://www.akamai.com/blog/cloud/akamai-connected-cloud-most-distributed-cloud-platform</guid>
	<pubDate>Tue, 14 Feb 2023 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Managing Hype Events to Delight Customers, Not Bot Operators</title>
	<description>Learn how to prepare for your hype event so you ensure your goods are available for your loyal customers … and not bots.</description>
	<link>https://www.akamai.com/blog/security/managing-hype-events-to-delight-customers</link>
	<author>David Sénécal</author>
	<guid>https://www.akamai.com/blog/security/managing-hype-events-to-delight-customers</guid>
	<pubDate>Fri, 10 Feb 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Recognized as a 2023 Gartner® Peer Insights™ Customers' Choice for Cloud WAAP</title>
	<description>Customers rate Akamai as a 2023 Customers' Choice for Cloud WAAP for the fourth consecutive year on Gartner® Peer Insights.™</description>
	<link>https://www.akamai.com/blog/security/akamai-2023-customers-choice-cloud-waap</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/akamai-2023-customers-choice-cloud-waap</guid>
	<pubDate>Thu, 09 Feb 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>4 Key Takeaways from the Akamai Retail Reimagined Bootcamp Indonesia </title>
	<description>Read about insights gleaned from the recent Akamai ecommerce bootcamp in Indonesia on how to build growth in a post-pandemic economy.</description>
	<link>https://www.akamai.com/blog/security/4-key-takeaways-akamai-retail-reimagined-bootcamp-indonesia</link>
	<author>Reuben Koh</author>
	<guid>https://www.akamai.com/blog/security/4-key-takeaways-akamai-retail-reimagined-bootcamp-indonesia</guid>
	<pubDate>Fri, 03 Feb 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Feature Spotlight: Kubernetes Enforcement </title>
	<description>Akamai’s new enforcement capabilities for K8s environments provides segmentation for applications and blocks lateral movement to, from, and inside K8s clusters.</description>
	<link>https://www.akamai.com/blog/security/feature-spotlight-kubernetes-enforcement</link>
	<author>Maya Luisan &amp; Omer Mayer</author>
	<guid>https://www.akamai.com/blog/security/feature-spotlight-kubernetes-enforcement</guid>
	<pubDate>Thu, 02 Feb 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>7 Key Takeaways for Financial Services from Recent Research</title>
	<description>Although the financial services cybersecurity programs are some of the most mature in the world, cybercriminals continue to find ways to revitalize old attacks.</description>
	<link>https://www.akamai.com/blog/security/7-key-takeaways-for-financial-services-from-recent-research</link>
	<author>Steve Winterfeld</author>
	<guid>https://www.akamai.com/blog/security/7-key-takeaways-for-financial-services-from-recent-research</guid>
	<pubDate>Wed, 01 Feb 2023 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Killnet Targets Healthcare — What You Need to Know, What You Need to Do</title>
	<description>As the war in Ukraine continues to heat up, the war against cyberattacks at home also intensifies as pro-Russia group Killnet targets healthcare organizations.</description>
	<link>https://www.akamai.com/blog/news/killnet-targets-healthcare</link>
	<author>Carley Thornell</author>
	<guid>https://www.akamai.com/blog/news/killnet-targets-healthcare</guid>
	<pubDate>Wed, 01 Feb 2023 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Can't Wait to Shut You Down — Remote DoS Using Wininit.exe</title>
	<description>Akamai researchers explore a new vulnerability that can be exploited to lead to denial-of-service attacks against Windows machines.</description>
	<link>https://www.akamai.com/blog/security-research/cant-wait-to-shut-you-down-msrpc-wininit</link>
	<author>Stiv Kupchik</author>
	<guid>https://www.akamai.com/blog/security-research/cant-wait-to-shut-you-down-msrpc-wininit</guid>
	<pubDate>Tue, 31 Jan 2023 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Introducing Malware Protection for Scanning File Uploads</title>
	<description>With Malware Protection, you can scan once at the edge and prevent malware from draining your time and budget.</description>
	<link>https://www.akamai.com/blog/edge/introducing-malware-protection-for-scanning-file-uploads</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/edge/introducing-malware-protection-for-scanning-file-uploads</guid>
	<pubDate>Tue, 31 Jan 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Beyond CWV: 11 More Performance Metrics to Monitor, Part 3 of 5</title>
	<description>Learn the differences between synthetic tests and real user monitoring, and discover 11 web performance metrics beyond the Core Web Vitals — and how to use them.</description>
	<link>https://www.akamai.com/blog/developers/beyond-cwv-more-performance-metrics-to-monitor-part-3-of-5</link>
	<author>Akamai Edge Delivery Product Marketing</author>
	<guid>https://www.akamai.com/blog/developers/beyond-cwv-more-performance-metrics-to-monitor-part-3-of-5</guid>
	<pubDate>Thu, 26 Jan 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Exploiting a Critical Spoofing Vulnerability in Windows CryptoAPI</title>
	<description>Akamai researchers have analyzed a critical vulnerability in Microsoft's CryptoAPI that would allow an attacker to masquerade as a legitimate entity.</description>
	<link>https://www.akamai.com/blog/security-research/exploiting-critical-spoofing-vulnerability-microsoft-cryptoapi</link>
	<author>Tomer Peled &amp; Yoni Rozenshein</author>
	<guid>https://www.akamai.com/blog/security-research/exploiting-critical-spoofing-vulnerability-microsoft-cryptoapi</guid>
	<pubDate>Wed, 25 Jan 2023 15:00:00 UTC</pubDate>

</item>
<item>
	<title>SEO Need-to-Knows: Google’s Core Web Vitals, Part 2 of 5</title>
	<description>Learn about Google's Core Web Vitals — LCP, FID, and CLS — and how improving them can enhance your users’ experience and SEO ranking.</description>
	<link>https://www.akamai.com/blog/developers/seo-google-core-web-vitals-part-2-of-5</link>
	<author>Akamai Edge Delivery Product Marketing</author>
	<guid>https://www.akamai.com/blog/developers/seo-google-core-web-vitals-part-2-of-5</guid>
	<pubDate>Thu, 19 Jan 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: 2022 Recap</title>
	<description>Read the year-end review of developer highlights for 2022.</description>
	<link>https://www.akamai.com/blog/developers/whats-new-for-developers-2022-recap</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/whats-new-for-developers-2022-recap</guid>
	<pubDate>Wed, 18 Jan 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Resource Limit Increases for EdgeWorkers Yield Big Results</title>
	<description>Read about how EdgeWorkers reduced errors resulting from resource limit constraints — unlocking even more opportunities for businesses</description>
	<link>https://www.akamai.com/blog/developers/resource-limit-increases-for-edgeworkers-yield-big-results</link>
	<author>AJ Johnson</author>
	<guid>https://www.akamai.com/blog/developers/resource-limit-increases-for-edgeworkers-yield-big-results</guid>
	<pubDate>Tue, 17 Jan 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Improving Popularity Rankings for  Better Threat Intelligence, Part 1</title>
	<description>AkaRank can overcome biases in current domain popularity lists and help ensure the best threat coverage and user experience.</description>
	<link>https://www.akamai.com/blog/security/improving-popularity-rankings-for-better-threat-intelligence-part-1</link>
	<author>Noy Aizenberg &amp; Congcong Xing</author>
	<guid>https://www.akamai.com/blog/security/improving-popularity-rankings-for-better-threat-intelligence-part-1</guid>
	<pubDate>Fri, 13 Jan 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on January’s Patch Tuesday 2023</title>
	<description>Every Patch Tuesday stirs up the community. See Akamai's insights and recommendations on what to focus on, and patch, patch, patch!</description>
	<link>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-january-2023</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-january-2023</guid>
	<pubDate>Fri, 13 Jan 2023 06:00:00 UTC</pubDate>

</item>
<item>
	<title>What Challenges Will 2023 Bring for Cyber?</title>
	<description>In 2023, the tech industry must address workforce diversity, manage cyber risks and regulations, and understand how innovation can challenge cyber resiliency.</description>
	<link>https://www.akamai.com/blog/security/what-challenges-will-2023-bring-for-cyber</link>
	<author>Lauren Van Wazer</author>
	<guid>https://www.akamai.com/blog/security/what-challenges-will-2023-bring-for-cyber</guid>
	<pubDate>Thu, 12 Jan 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>3 Ransomware Questions Every Security Leader Should Be Able to Answer</title>
	<description>Read about how organizations need microsegmentation to identify and remediate ransomware attacks, and the ransomware questions they need to answer.</description>
	<link>https://www.akamai.com/blog/security/ransomware-questions-organizations-need-to-answer</link>
	<author>Pavel Gurvich</author>
	<guid>https://www.akamai.com/blog/security/ransomware-questions-organizations-need-to-answer</guid>
	<pubDate>Tue, 10 Jan 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Building an Effective Bot Management Strategy</title>
	<description>Effectively managing bot traffic requires a combination of strong detection and response strategies. Here, we explore Akamai’s methods for implementing both.</description>
	<link>https://www.akamai.com/blog/security/building-an-effective-bot-management-strategy</link>
	<author>David Sénécal</author>
	<guid>https://www.akamai.com/blog/security/building-an-effective-bot-management-strategy</guid>
	<pubDate>Wed, 04 Jan 2023 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Boost Your Page Load Times with Performance Engineering, Part 1 of 5</title>
	<description>Get up to speed with web performance, the Core Web Vitals, and other metrics to increase your revenue and rank your page higher on Google.</description>
	<link>https://www.akamai.com/blog/developers/performance-engineering-part-1-of-5</link>
	<author>Akamai Edge Delivery Product Marketing</author>
	<guid>https://www.akamai.com/blog/developers/performance-engineering-part-1-of-5</guid>
	<pubDate>Tue, 20 Dec 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Emulating KmsdBot’s Command and Control and Examining Its Attack Traffic </title>
	<description>Read about the global impact of KmsdBot, a botnet that hit our honeypot earlier this year, and why the evidence is pointing toward it being a DDoS for hire.</description>
	<link>https://www.akamai.com/blog/security-research/kmsdbot-part-three-examining-attack-traffic</link>
	<author>Larry Cashdollar &amp; Allen West</author>
	<guid>https://www.akamai.com/blog/security-research/kmsdbot-part-three-examining-attack-traffic</guid>
	<pubDate>Mon, 19 Dec 2022 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Careful Workload Placement Can Create Cloud Cost Savings</title>
	<description>Optimizing the cost-effectiveness of cloud infrastructure requires the careful placement of workloads in the environments best suited to their execution.</description>
	<link>https://www.akamai.com/blog/cloud/careful-workload-placement-can-create-cloud-cost-savings</link>
	<author>Liam Eagle</author>
	<guid>https://www.akamai.com/blog/cloud/careful-workload-placement-can-create-cloud-cost-savings</guid>
	<pubDate>Fri, 16 Dec 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on December’s Patch Tuesday 2022</title>
	<description>Every Patch Tuesday stirs up the community. See Akamai's December insights and recommendations on what to focus on, and patch, patch, patch!</description>
	<link>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-december-2022</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-december-2022</guid>
	<pubDate>Fri, 16 Dec 2022 06:00:00 UTC</pubDate>

</item>
<item>
	<title>Why Do I Need Zero Trust on My Endpoint If I Have EDR/XDR?</title>
	<description>Do you need a Zero Trust solution if you have EDR/XDR installed? The short answer is yes — you need both.</description>
	<link>https://www.akamai.com/blog/security/you-need-both-zero-trust-and-edr-xdr</link>
	<author>Ravit Greitser</author>
	<guid>https://www.akamai.com/blog/security/you-need-both-zero-trust-and-edr-xdr</guid>
	<pubDate>Thu, 15 Dec 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>You’ve Crossed the Line — Disturbing a Host’s Rest</title>
	<description>Akamai researchers explore two new vulnerabilities that can be exploited to lead to denial-of-service attacks against container and session services.</description>
	<link>https://www.akamai.com/blog/security-research/msrpc-lsm-cve-disturbing-hosts-rest</link>
	<author>Ben Barnea</author>
	<guid>https://www.akamai.com/blog/security-research/msrpc-lsm-cve-disturbing-hosts-rest</guid>
	<pubDate>Wed, 14 Dec 2022 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Welcomed Partners to a Memorable Asia-Pacific and Japan Partner Summit </title>
	<description>Learn about the recent Akamai APJ Partner Summit 2022, including new revenue opportunities for our partners – and the awards we gave.</description>
	<link>https://www.akamai.com/blog/news/akamai-apj-partner-summit</link>
	<author>Tatsuya Suzuki</author>
	<guid>https://www.akamai.com/blog/news/akamai-apj-partner-summit</guid>
	<pubDate>Tue, 13 Dec 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Measuring User Experience with Real User Data</title>
	<description>Use data from real users to improve the user experience (UX) of your site or app, and draw on real behavior and outcomes for effective UX decision-making.</description>
	<link>https://www.akamai.com/blog/performance/measuring-user-experience-with-real-user-data</link>
	<author>Julio Chaves Herrera</author>
	<guid>https://www.akamai.com/blog/performance/measuring-user-experience-with-real-user-data</guid>
	<pubDate>Tue, 13 Dec 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>An Overview of MS-RPC and Its Security Mechanisms</title>
	<description>MS-RPC is a widely used protocol, but not much security research is done on it. In this blog, see an overview of MS-RPC and their security mechanisms.</description>
	<link>https://www.akamai.com/blog/security-research/msrpc-security-mechanisms</link>
	<author>Ben Barnea</author>
	<guid>https://www.akamai.com/blog/security-research/msrpc-security-mechanisms</guid>
	<pubDate>Thu, 08 Dec 2022 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Is Stopping a Ransomware Attack More Important Than Preventing One?</title>
	<description>Microsegmentation can stop a ransomware attack from moving laterally across your organization and prevent malicious behavior.</description>
	<link>https://www.akamai.com/blog/security/stopping-ransomware-attacks-with-microsegmentation</link>
	<author>Dan Petrillo &amp; Jim Black</author>
	<guid>https://www.akamai.com/blog/security/stopping-ransomware-attacks-with-microsegmentation</guid>
	<pubDate>Wed, 07 Dec 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Elevate Streaming Media with EdgeWorkers and Macrometa Stream Workers</title>
	<description>Elevate players’ gaming experiences with Akamai EdgeWorkers and Macrometa Stream Workers.</description>
	<link>https://www.akamai.com/blog/cloud/elevate-streaming-media-with-edgeworkers-and-stream-workers</link>
	<author>Durga Gokina</author>
	<guid>https://www.akamai.com/blog/cloud/elevate-streaming-media-with-edgeworkers-and-stream-workers</guid>
	<pubDate>Tue, 06 Dec 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Not Every Cloud Is Meant for Every Workload</title>
	<description>Understanding which cloud platforms are the best fit for which workloads can maximize your return on investment and your customers’ output.
</description>
	<link>https://www.akamai.com/blog/cloud/not-every-cloud-is-meant-for-every-workload</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/cloud/not-every-cloud-is-meant-for-every-workload</guid>
	<pubDate>Mon, 05 Dec 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>A Closer Look at Ransomware Attack Trends in APJ</title>
	<description>Read about the surge of ransomware as a service (RaaS) cyberattack trends in APJ, and the infamous (and prolific) Conti group’s role in them.</description>
	<link>https://www.akamai.com/blog/security-research/ransomware-attack-trends-in-apj</link>
	<author>Badette Tribbey</author>
	<guid>https://www.akamai.com/blog/security-research/ransomware-attack-trends-in-apj</guid>
	<pubDate>Thu, 01 Dec 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Accidentally Crashing a Botnet</title>
	<description>As part of our research into the cryptomining botnet kmsdbot, we rendered it useless.</description>
	<link>https://www.akamai.com/blog/security-research/kmsdbot-part-two-crashing-a-botnet</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security-research/kmsdbot-part-two-crashing-a-botnet</guid>
	<pubDate>Wed, 30 Nov 2022 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Expanding API Security Awareness at API World</title>
	<description>API security should be a primary concern for organizations. Learn about the three principles of APIs to help protect against attacks. </description>
	<link>https://www.akamai.com/blog/security/expanding-api-security-awareness-at-api-world</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/expanding-api-security-awareness-at-api-world</guid>
	<pubDate>Tue, 29 Nov 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Enemy at the Gates:  Analyzing Attacks on Financial Services</title>
	<description>Financial services is an often attacked vertical, but to what extent and how? This blog post will cover several security issues affecting this industry.</description>
	<link>https://www.akamai.com/blog/security-research/analyzing-attacks-on-financial-services</link>
	<author>Badette Tribbey &amp; Steve Winterfeld</author>
	<guid>https://www.akamai.com/blog/security-research/analyzing-attacks-on-financial-services</guid>
	<pubDate>Mon, 28 Nov 2022 11:00:00 UTC</pubDate>

</item>
<item>
	<title>Manage Akamai Features at the Edge with EdgeWorkers and EdgeKV</title>
	<description>EdgeWorkers and EdgeKV lets you set feature flags that tailor content to different website visitors.
</description>
	<link>https://www.akamai.com/blog/developers/manage-akamai-features-with-edgeworkers-and-edgekv</link>
	<author>Philip McGuinness</author>
	<guid>https://www.akamai.com/blog/developers/manage-akamai-features-with-edgeworkers-and-edgekv</guid>
	<pubDate>Tue, 22 Nov 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Wartime Sparks Unpredictable Shifts in DDoS Targeting</title>
	<description>DDoS cyberattacks targeting European customers on the Akamai Prolexic platform are increasing worldwide, In response, Akamai unveiled its new DDoS solution.</description>
	<link>https://www.akamai.com/blog/security/wartime-sparks-unpredictable-shifts-in-ddos-targeting</link>
	<author>Craig Sparling &amp; Max Gebhardt</author>
	<guid>https://www.akamai.com/blog/security/wartime-sparks-unpredictable-shifts-in-ddos-targeting</guid>
	<pubDate>Tue, 22 Nov 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Four Steps: Effective API Security Using a Digital Bonding Strategy</title>
	<description>Focus on API security as part of your digital bonding strategy, because APIs are already connecting your business activities.</description>
	<link>https://www.akamai.com/blog/security/four-steps-effective-api-security-using-digital-bonding-strategy</link>
	<author>Abigail Ojeda</author>
	<guid>https://www.akamai.com/blog/security/four-steps-effective-api-security-using-digital-bonding-strategy</guid>
	<pubDate>Mon, 21 Nov 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Is Delighted to Partner with Teneo and Bytes Software Services</title>
	<description>Akamai’s partnerships with Teneo and Bytes Software Solutions help us to adapt, grow, and innovate in an ever-changing landscape.</description>
	<link>https://www.akamai.com/blog/partners/2022/nov/akamai-partners-with-teneo-and-bytes-software-services</link>
	<author>Ina Christova</author>
	<guid>https://www.akamai.com/blog/partners/2022/nov/akamai-partners-with-teneo-and-bytes-software-services</guid>
	<pubDate>Fri, 18 Nov 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: November 2022</title>
	<description>Read about the EdgeGrid PHP client update, EdgeWorkers news, the Terraform Provider 3.0 release, and the new Build, Deliver &amp; Secure video series.</description>
	<link>https://www.akamai.com/blog/developers/whats-new-for-developers-november-2022</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/whats-new-for-developers-november-2022</guid>
	<pubDate>Thu, 17 Nov 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>SD-WAN Integration: Routing Traffic to Optimize Network Performance</title>
	<description>Optimize network performance with SD-WAN integration to automatically route traffic to the nearest Akamai Secure Internet Access point of presence.</description>
	<link>https://www.akamai.com/blog/security/sd-wan-routing-traffic-optimize-network-performance</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/sd-wan-routing-traffic-optimize-network-performance</guid>
	<pubDate>Wed, 16 Nov 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Highly Sophisticated Phishing Scams Are Abusing Holiday Sentiment</title>
	<description>The holiday season is around the corner, which means phishing season is too. Akamai Security Research details the new ways adversaries are abusing the holidays.</description>
	<link>https://www.akamai.com/blog/security-research/sophisticated-phishing-scam-abusing-holiday-sentiment</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security-research/sophisticated-phishing-scam-abusing-holiday-sentiment</guid>
	<pubDate>Wed, 16 Nov 2022 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on November’s Patch Tuesday</title>
	<description>Every Patch Tuesday stirs up the community. See Akamai's November insights and recommendations on what to focus on, and patch, patch, patch!</description>
	<link>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-november-2022</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-november-2022</guid>
	<pubDate>Tue, 15 Nov 2022 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Tackle Your Cloud Challenges, One Scenario at a Time</title>
	<description>Forrester’s quick start cards cover 18 common issues with cloud migrations and operations, and suggest actions to mitigate each one.</description>
	<link>https://www.akamai.com/blog/cloud/tackle-your-cloud-challenges-one-scenario-at-a-time</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/cloud/tackle-your-cloud-challenges-one-scenario-at-a-time</guid>
	<pubDate>Tue, 15 Nov 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>KmsdBot: The Attack and Mine Malware</title>
	<description>Akamai security research has observed a new malware: a cryptominer with dreams of DDoS functionality. Read about kmdsbot in this blog.</description>
	<link>https://www.akamai.com/blog/security-research/kmdsbot-the-attack-and-mine-malware</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security-research/kmdsbot-the-attack-and-mine-malware</guid>
	<pubDate>Thu, 10 Nov 2022 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Evolving Digital Experiences at the Edge</title>
	<description>The modern application has evolved and shifted to the edge. This inevitable adoption is improving the digital experience for end users.</description>
	<link>https://www.akamai.com/blog/developers/evolving-digital-experiences-at-the-edge</link>
	<author>Nancy Carvajal </author>
	<guid>https://www.akamai.com/blog/developers/evolving-digital-experiences-at-the-edge</guid>
	<pubDate>Thu, 10 Nov 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>On-Ramping Traffic to a Cloud-Based Secure Web Gateway</title>
	<description>Though cloud-based secure web gateways (SWGs) eliminate many problems, it’s important to select the right approach to on-ramping traffic based on use case and protection level.</description>
	<link>https://www.akamai.com/blog/security/on-ramping-traffic-to-cloud-based-secure-web-gateway-part-1</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/on-ramping-traffic-to-cloud-based-secure-web-gateway-part-1</guid>
	<pubDate>Wed, 09 Nov 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>CDN Meets GDN: Akamai Partners with Macrometa</title>
	<description>The web needs a CDN; the cloud needs a GDN. What does that mean and why is it important for developers?</description>
	<link>https://www.akamai.com/blog/cloud/cdn-meets-gdn-akamai-partners-macrometa</link>
	<author>Durga Gokina</author>
	<guid>https://www.akamai.com/blog/cloud/cdn-meets-gdn-akamai-partners-macrometa</guid>
	<pubDate>Tue, 08 Nov 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>An update on the impact of OpenSSL CVE-2022-3602 and CVE-2022-3786 on Akamai's systems</title>
	<description>In this post, we share the impact of the OpenSSL vulnerabilities CVE-2022-3602 and CVE-2022-3786 on Akamai and our customers.</description>
	<link>https://www.akamai.com/blog/security/update-impact-openssl-cve-2022-3602-cve-2022-3786</link>
	<author>Jan Schaumann</author>
	<guid>https://www.akamai.com/blog/security/update-impact-openssl-cve-2022-3602-cve-2022-3786</guid>
	<pubDate>Mon, 07 Nov 2022 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Improve URL Redirects with EdgeWorkers and EdgeKV</title>
	<description>Use Akamai EdgeWorkers and Akamai EdgeKV to make intelligent redirect decisions.</description>
	<link>https://www.akamai.com/blog/developers/improve-url-redirects-with-edgeworkers-and-edgekv</link>
	<author>Philip McGuinness</author>
	<guid>https://www.akamai.com/blog/developers/improve-url-redirects-with-edgeworkers-and-edgekv</guid>
	<pubDate>Thu, 03 Nov 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>DNS Threat Report — Q3 2022</title>
	<description>Akamai's visibility into global traffic through Q3 provides insight into phishing campaigns and potential user susceptibility to malware attacks.</description>
	<link>https://www.akamai.com/blog/security-research/dns-threat-report-q3-2022</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security-research/dns-threat-report-q3-2022</guid>
	<pubDate>Mon, 31 Oct 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Effectively Preparing for the OpenSSL 3.x Vulnerability</title>
	<description>With all the noise about the OpenSSL vulnerability, see this blog about how to prepare for mitigation when the patch is released. </description>
	<link>https://www.akamai.com/blog/security-research/openssl-vulnerability-how-to-effectively-prepare</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/openssl-vulnerability-how-to-effectively-prepare</guid>
	<pubDate>Mon, 31 Oct 2022 09:00:27 UTC</pubDate>

</item>
<item>
	<title>Better A/B Testing with EdgeWorkers + EdgeKV</title>
	<description>Learn how to use Akamai EdgeWorkers and EdgeKV to create easy-to-control A/B tests.</description>
	<link>https://www.akamai.com/blog/developers/better-a-b-testing-with-edgeworkes-edgekv</link>
	<author>Philip McGuinness</author>
	<guid>https://www.akamai.com/blog/developers/better-a-b-testing-with-edgeworkes-edgekv</guid>
	<pubDate>Fri, 28 Oct 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>User-Agent Reduction</title>
	<description>Chrome is rolling out changes to the browser’s User-Agent string that will affect how web servers, applications, and CDNs like Akamai gather information about the current user agent (such as the browser’s version, device, and platform information).</description>
	<link>https://www.akamai.com/blog/developers/user-agent-reduction</link>
	<author>Nic Jansma</author>
	<guid>https://www.akamai.com/blog/developers/user-agent-reduction</guid>
	<pubDate>Thu, 27 Oct 2022 16:00:00 UTC</pubDate>

</item>
<item>
	<title>dhpcd: The Cryptominer That Hid for Four Years</title>
	<description>Akamai Researchers have uncovered a long-running attack campaign attack targeting Linux SSH servers that has been running a monero cryptominer.</description>
	<link>https://www.akamai.com/blog/security-research/dhpcd-cryptominer-hid-four-years</link>
	<author>Oryan De Paz</author>
	<guid>https://www.akamai.com/blog/security-research/dhpcd-cryptominer-hid-four-years</guid>
	<pubDate>Wed, 26 Oct 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Prolexic Launches Sixth-Generation DDoS Platform Upgrade</title>
	<description>Today, we are excited to announce a significant evolution of Akamai’s distributed denial-of-service (DDoS) protection solution, Prolexic.</description>
	<link>https://www.akamai.com/blog/news/akamais-prolexic-launches-sixth-generation-ddos-platform-upgrade</link>
	<author>Ankita Kharya</author>
	<guid>https://www.akamai.com/blog/news/akamais-prolexic-launches-sixth-generation-ddos-platform-upgrade</guid>
	<pubDate>Tue, 25 Oct 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: October 2022  </title>
	<description>Read about our new Postman collections, the latest Akamai PowerShell release, our improvements to Edge Diagnostics, and how to quickly integrate Linode with Akamai.</description>
	<link>https://www.akamai.com/blog/developers/whats-new-for-developers-october-2022</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/whats-new-for-developers-october-2022</guid>
	<pubDate>Mon, 24 Oct 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Getting It Done: It’s Go Time for Bold Leadership in Sustainability</title>
	<description>Sustainability professionals from around the world convened in New York City for Climate Week NYC 2022, exploring the theme of the week to “get it done.”</description>
	<link>https://www.akamai.com/blog/sustainability/its-go-time-for-bold-leadership-in-sustainability</link>
	<author>Mike Mattera</author>
	<guid>https://www.akamai.com/blog/sustainability/its-go-time-for-bold-leadership-in-sustainability</guid>
	<pubDate>Mon, 24 Oct 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Secure Internet Access Is Needed Everywhere</title>
	<description>Internet threats have made businesses (and people) vulnerable. Learn how to maintain effective security against cyberthreats with Secure Internet Access.</description>
	<link>https://www.akamai.com/blog/security/secure-internet-access-needed-everywhere</link>
	<author>Bruce Van Nice</author>
	<guid>https://www.akamai.com/blog/security/secure-internet-access-needed-everywhere</guid>
	<pubDate>Fri, 21 Oct 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Securing Applications in a Multicloud World</title>
	<description>Widespread adoption of multicloud architecture presents challenges in securing applications. Learn about the benefits of deploying security controls on the edge.</description>
	<link>https://www.akamai.com/blog/cloud/securing-applications-in-a-multicloud-world</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/cloud/securing-applications-in-a-multicloud-world</guid>
	<pubDate>Thu, 20 Oct 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Who’s Scanning the IPv6 Space? And, Frankly, Why Do We Even Care?</title>
	<description>Securing IPv6 is no longer optional, it's a necessity. In this first of its kind empirical study on the vulnerability scanning landscape of IPv6, you'll learn the challenges and differences between IPv6 and IPv4 to be better prepared for the future.</description>
	<link>https://www.akamai.com/blog/security-research/vulnerability-scanning-ipv6-why-should-we-care</link>
	<author>Philipp Richter</author>
	<guid>https://www.akamai.com/blog/security-research/vulnerability-scanning-ipv6-why-should-we-care</guid>
	<pubDate>Wed, 19 Oct 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>A Vote of Confidence for Election Security</title>
	<description>CISA has released its free Cybersecurity Toolkit to help election authorities prepare for possible threats. Read more to learn about its offerings.</description>
	<link>https://www.akamai.com/blog/security/a-vote-of-confidence-for-election-security</link>
	<author>Drew Reinders</author>
	<guid>https://www.akamai.com/blog/security/a-vote-of-confidence-for-election-security</guid>
	<pubDate>Tue, 18 Oct 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on October’s Patch Tuesday 2022</title>
	<description>Every Patch Tuesday stirs up the community. See Akamai's October insights and recommendations on what to focus on, and patch, patch, patch!</description>
	<link>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-october-2022</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-october-2022</guid>
	<pubDate>Fri, 14 Oct 2022 17:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Wins Brandon Hall Gold Award in Extended Enterprise Learning</title>
	<description>For the third consecutive year, Akamai Global Services has won the coveted Gold Award from Brandon Hall Group.</description>
	<link>https://www.akamai.com/blog/news/akamai-wins-brandon-hall-gold-award-extended-enterprise-learning</link>
	<author>Natalia Zbijowska</author>
	<guid>https://www.akamai.com/blog/news/akamai-wins-brandon-hall-gold-award-extended-enterprise-learning</guid>
	<pubDate>Wed, 12 Oct 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Cold Hard Cache — Bypassing RPC Interface Security with Cache Abuse</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/cold-hard-cache-bypassing-rpc-with-cache-abuse</link>
	<author>Ben Barnea &amp; Stiv Kupchik</author>
	<guid>https://www.akamai.com/blog/security-research/cold-hard-cache-bypassing-rpc-with-cache-abuse</guid>
	<pubDate>Tue, 11 Oct 2022 07:00:00 UTC</pubDate>

</item>
<item>
	<title>The Internet Architecture Board Takes on Sustainability</title>
	<description>Join Akamai and the Internet Architecture Board to make #shift happen. Let's work together to make life better for billions of people, billions of times a day. #GreenWithAkamai</description>
	<link>https://www.akamai.com/blog/sustainability/the-internet-architecture-board-takes-on-sustainability</link>
	<author>Mike Mattera</author>
	<guid>https://www.akamai.com/blog/sustainability/the-internet-architecture-board-takes-on-sustainability</guid>
	<pubDate>Mon, 10 Oct 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Holiday Readiness, Part II: Best Practices for Detecting and Mitigating Attacks</title>
	<description>Stay one step ahead of bad actors this holiday season with best practices to detect and mitigate attacks.</description>
	<link>https://www.akamai.com/blog/security/holiday-readiness-best-practices-detecting-mitigating-attacks</link>
	<author>Jeff Darnton</author>
	<guid>https://www.akamai.com/blog/security/holiday-readiness-best-practices-detecting-mitigating-attacks</guid>
	<pubDate>Fri, 07 Oct 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Edge DNS and the Top-Level Domain Hosting</title>
	<description>Akamai Edge DNS offers the scale and functionality to meet ICANN’s intensive requirements for hosting a generic top-level domain (gTLD) zone in DNS.</description>
	<link>https://www.akamai.com/blog/edge/edge-dns-and-the-top-level-domain-hosting</link>
	<author>Sam Preston</author>
	<guid>https://www.akamai.com/blog/edge/edge-dns-and-the-top-level-domain-hosting</guid>
	<pubDate>Thu, 06 Oct 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Mitigates Hop-by-Hop Header Abuse Leading to Request Smuggling</title>
	<description>Security researchers identified and disclosed a new technique of hop-by-hop header attacks, leading to request smuggling, which Akamai successfully mitigated.
</description>
	<link>https://www.akamai.com/blog/security/akamai-mitigates-hop-by-hop-header-abuse</link>
	<author>Kaan Onarlioglu</author>
	<guid>https://www.akamai.com/blog/security/akamai-mitigates-hop-by-hop-header-abuse</guid>
	<pubDate>Wed, 05 Oct 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Financial Services Malware Just Won’t Die: What to Do About It?</title>
	<description>The continued reemergence of the Emotet malware is keeping cybersecurity professionals on their toes. Zero Trust solutions are here to help.</description>
	<link>https://www.akamai.com/blog/security/financial-services-malware-just-wont-die</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/financial-services-malware-just-wont-die</guid>
	<pubDate>Tue, 04 Oct 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Response to Zero-Day Vulnerabilities in Microsoft Exchange Server (CVE-2022-41040 and CVE-2022-41082)</title>
	<description>Akamai Security Research has released web application firewall protections for Microsoft Exchange CVE-2022-41040 and CVE-2022-41082.</description>
	<link>https://www.akamai.com/blog/security-research/akamais-response-zero-day-vulnerabilities-microsoft-exchange-server</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/akamais-response-zero-day-vulnerabilities-microsoft-exchange-server</guid>
	<pubDate>Mon, 03 Oct 2022 09:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Aids India Through Corporate Social Responsibility Partnerships</title>
	<description>Akamai’s Corporate Social Responsibility Trust partners with nonprofit organizations to help enhance the lives of people across India.</description>
	<link>https://www.akamai.com/blog/culture/akamai-aids-india-through-corporate-social-responsibility-partnerships</link>
	<author>Neha Jain</author>
	<guid>https://www.akamai.com/blog/culture/akamai-aids-india-through-corporate-social-responsibility-partnerships</guid>
	<pubDate>Fri, 30 Sep 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>API Security for DevSecOps</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/2024/sep/api-security-for-devsecops</link>
	<author>Stas Neyman</author>
	<guid>https://www.akamai.com/blog/security/2024/sep/api-security-for-devsecops</guid>
	<pubDate>Thu, 29 Sep 2022 14:19:00 UTC</pubDate>

</item>
<item>
	<title>Flagging 13 Million Malicious Domains in 1 Month with Newly Observed Domains</title>
	<description>Threat Intelligence feeds are an integral part of any security strategy. In this new research see how Akamai researchers were able to find 8 million malicious domains every month to further protect our customers.</description>
	<link>https://www.akamai.com/blog/security-research/newly-observed-domains-discovered-13-million-malicious-domains</link>
	<author>Stijn Tilborghs</author>
	<guid>https://www.akamai.com/blog/security-research/newly-observed-domains-discovered-13-million-malicious-domains</guid>
	<pubDate>Wed, 28 Sep 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Named a Leader in The Forrester Wave™: Web Application Firewalls, Q3 2022</title>
	<description>Forrester’s 2022 evaluation of web application firewalls ranks Akamai as a Leader with the top score among all evaluated vendors in the attack detection criterion.</description>
	<link>https://www.akamai.com/blog/security/akamai-named-a-leader-in-the-forrester-wave</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/akamai-named-a-leader-in-the-forrester-wave</guid>
	<pubDate>Tue, 27 Sep 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Turns Up Linode Past 11</title>
	<description>Akamai plans to add more than a dozen data centers, equipped with Linode’s full product suite – across North America, APAC, LATAM and Europe by the end of 2023.</description>
	<link>https://www.akamai.com/blog/cloud/akamai-turns-up-linode-past-11</link>
	<author>Shawn Michels</author>
	<guid>https://www.akamai.com/blog/cloud/akamai-turns-up-linode-past-11</guid>
	<pubDate>Tue, 27 Sep 2022 01:00:00 UTC</pubDate>

</item>
<item>
	<title>6 Key Insights from Akamai India Leadership Industry Summits</title>
	<description>What does the future look like for consumer-to-internet and OTT media services in India? Here are six thought-provoking insights from CXOs. </description>
	<link>https://www.akamai.com/blog/security/6-key-insights-from-akamai-india-leadership-industry-summits</link>
	<author>Mitesh Jain</author>
	<guid>https://www.akamai.com/blog/security/6-key-insights-from-akamai-india-leadership-industry-summits</guid>
	<pubDate>Mon, 26 Sep 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: September 2022 </title>
	<description>Learn about Akamai’s voxel art contest, the updates to EdgeWorkers and EdgeKV demo sites, and how the beta Test Center CLI allows you to test the behavior of configuration changes on your own in this month’s blog.</description>
	<link>https://www.akamai.com/blog/developers/whats-new-for-developers-september-2022</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/whats-new-for-developers-september-2022</guid>
	<pubDate>Fri, 23 Sep 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Purple Fox Rootkit Now Propagates as a Worm</title>
	<description>Purple Fox is an active malware campaign targeting Windows machines. Up until recently, Purple Fox’s operators infected machines by using exploit kits and phishing emails.</description>
	<link>https://www.akamai.com/blog/security/purple-fox-rootkit-now-propagates-as-a-worm</link>
	<author>Guardicore Labs Team</author>
	<guid>https://www.akamai.com/blog/security/purple-fox-rootkit-now-propagates-as-a-worm</guid>
	<pubDate>Thu, 22 Sep 2022 19:59:00 UTC</pubDate>

</item>
<item>
	<title>FritzFrog: A New Generation of Peer-to-Peer Botnets</title>
	<description>Guardicore has discovered FritzFrog, a sophisticated peer-to-peer (P2P) botnet that has been actively breaching SSH servers since January 2020.</description>
	<link>https://www.akamai.com/blog/security/fritzfrog-a-new-generation-of-peer-to-peer-botnets</link>
	<author>Ophir Harpaz</author>
	<guid>https://www.akamai.com/blog/security/fritzfrog-a-new-generation-of-peer-to-peer-botnets</guid>
	<pubDate>Wed, 21 Sep 2022 20:36:00 UTC</pubDate>

</item>
<item>
	<title>EDR vs. Segmentation: Understanding the Differences </title>
	<description></description>
	<link>https://www.akamai.com/blog/security/understanding-the-differences-between-edr-and-segmentation</link>
	<author>Marco Raffaelli</author>
	<guid>https://www.akamai.com/blog/security/understanding-the-differences-between-edr-and-segmentation</guid>
	<pubDate>Wed, 21 Sep 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Meet Prachi Shah, Senior Service Architect </title>
	<description>Senior Service Architect Prachi Shah discusses how customer feedback plays a crucial role in product development at Akamai.</description>
	<link>https://www.akamai.com/blog/developers/meet-prachi-shah-senior-service-architect</link>
	<author>Chuck Freedman</author>
	<guid>https://www.akamai.com/blog/developers/meet-prachi-shah-senior-service-architect</guid>
	<pubDate>Mon, 19 Sep 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>In-App Browsers and Akamai Client-Side Protection &amp; Compliance</title>
	<description> Learn how Akamai's Client-Side Protection &amp; Compliance tracks In-App browser injections to make sure sensitive information is kept safe and private.</description>
	<link>https://www.akamai.com/blog/security-research/in-app-browsers-and-akamai-page-integrity-manager</link>
	<author>Gal Meiri</author>
	<guid>https://www.akamai.com/blog/security-research/in-app-browsers-and-akamai-page-integrity-manager</guid>
	<pubDate>Fri, 16 Sep 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on September’s Patch Tuesday</title>
	<description>Every Patch Tuesday stirs up the community. See Akamai's September insights and recommendations on what to focus on, and patch, patch, patch!</description>
	<link>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-september</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security-research/akamai-perspective-patch-tuesday-september</guid>
	<pubDate>Fri, 16 Sep 2022 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Record-Breaking DDoS Attack in Europe</title>
	<description>On Monday, September 12, 2022, Akamai successfully detected and mitigated the now-largest DDoS attack ever launched.</description>
	<link>https://www.akamai.com/blog/security/record-breaking-ddos-attack-in-europe</link>
	<author>Craig Sparling &amp; Max Gebhardt</author>
	<guid>https://www.akamai.com/blog/security/record-breaking-ddos-attack-in-europe</guid>
	<pubDate>Thu, 15 Sep 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Fight Video Piracy: Notes from a Real-Life Battle</title>
	<description>Video streaming is increasing and so is video piracy. Learn more about these types of piracy cybercrimes, and how to be proactive in stopping them.</description>
	<link>https://www.akamai.com/blog/security/how-to-fight-video-piracy-notes-from-a-real-life-battle</link>
	<author>Mark H. Barron</author>
	<guid>https://www.akamai.com/blog/security/how-to-fight-video-piracy-notes-from-a-real-life-battle</guid>
	<pubDate>Thu, 08 Sep 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>DDoS in Financial Services: What to Know and What to Do</title>
	<description>Akamai explores trends of recent application-layer DDoS attacks across the Financial Services industry</description>
	<link>https://www.akamai.com/blog/security-research/ddos-in-financial-services</link>
	<author>Mark Schimmelbusch &amp; Dennis Birchard</author>
	<guid>https://www.akamai.com/blog/security-research/ddos-in-financial-services</guid>
	<pubDate>Thu, 08 Sep 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Cyberterrorists Target Record Number of Victims with DDoS Attacks in Q2</title>
	<description>In Q2, cyberterrorists targeted a record number of customer locations (groupings of assets based on cloud presence or physical data center) with DDoS attacks.</description>
	<link>https://www.akamai.com/blog/security/cyberterrorists-target-record-number-of-victims</link>
	<author>Craig Sparling &amp; Max Gebhardt</author>
	<guid>https://www.akamai.com/blog/security/cyberterrorists-target-record-number-of-victims</guid>
	<pubDate>Wed, 07 Sep 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Named a 2022 Gartner® Magic Quadrant Leader for Cloud Web Application and API Protection</title>
	<description>Akamai was named a Leader in the 2022 Gartner® Magic Quadrant for Cloud Web Application and API Protection (WAAP) report, and was positioned highest for Ability to Execute and furthest for Completeness of Vision. </description>
	<link>https://www.akamai.com/blog/security/akamai-named-a-2022-gartner-magic-quadrant-leader</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/akamai-named-a-2022-gartner-magic-quadrant-leader</guid>
	<pubDate>Tue, 06 Sep 2022 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Holiday Readiness, Part I: Best Practices for Maintaining Peak Performance</title>
	<description>Preparing for a post-pandemic holiday season means managing for peak application and system performance.</description>
	<link>https://www.akamai.com/blog/performance/holiday-readiness-part-1-best-practices-for-maintaining-peak-performance</link>
	<author>Jeff Darnton</author>
	<guid>https://www.akamai.com/blog/performance/holiday-readiness-part-1-best-practices-for-maintaining-peak-performance</guid>
	<pubDate>Thu, 01 Sep 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Now Available on GitHub: Akamai CLI Utility v1.0 for Akamai Terraform </title>
	<description>With v0.9 of the Akamai CLI for Terraform, application development teams can build on infrastructure as code (IaC) and maintain rapid development without compromising security.</description>
	<link>https://www.akamai.com/blog/security/now-available-on-github-akamai-cli-utility-for-akamai-terraform</link>
	<author>Alfred Chung</author>
	<guid>https://www.akamai.com/blog/security/now-available-on-github-akamai-cli-utility-for-akamai-terraform</guid>
	<pubDate>Tue, 30 Aug 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>New Prolexic Partner Megaport Now Live in Australia</title>
	<description>As part of Akamai’s focus on serving local market needs, we are thrilled to announce new Prolexic connectivity options via Megaport Elastic Fabric in Australia.</description>
	<link>https://www.akamai.com/blog/news/new-prolexic-partner-megaport-now-live-in-australia</link>
	<author>Greg Burns</author>
	<guid>https://www.akamai.com/blog/news/new-prolexic-partner-megaport-now-live-in-australia</guid>
	<pubDate>Mon, 29 Aug 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: August 2022</title>
	<description>This August’s developer update brings you some of the things we’ve been most excited to tell you about. We’re highlighting Terraform updates and more.</description>
	<link>https://www.akamai.com/blog/developers/whats-new-for-developers-august-2022</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/whats-new-for-developers-august-2022</guid>
	<pubDate>Thu, 25 Aug 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Mitigating Log4j Abuse Using Akamai Guardicore Segmentation</title>
	<description>Learn how Akamai Guardicore Segmentation can help you reveal vulnerable servers and applications, and stop exploitation.</description>
	<link>https://www.akamai.com/blog/security/recommendations-for-log4j-mitigation</link>
	<author>Guardicore Labs Team</author>
	<guid>https://www.akamai.com/blog/security/recommendations-for-log4j-mitigation</guid>
	<pubDate>Thu, 25 Aug 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Insights on DNS in Q2 2022</title>
	<description></description>
	<link>https://www.akamai.com/blog/security-research/q2-dns-akamai-insights</link>
	<author>Or Katz &amp; Jim Black</author>
	<guid>https://www.akamai.com/blog/security-research/q2-dns-akamai-insights</guid>
	<pubDate>Thu, 25 Aug 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Meet Jessica Scherlag: Senior Manager of Social Media and Engagement</title>
	<description>Jessica Scherlag discusses the importance of social media platforms, her unconventional career path, and the benefits of pushing past your comfort zone. </description>
	<link>https://www.akamai.com/blog/culture/meet-jessica-scherlag-senior-manager-social-media-engagement</link>
	<author>Tashema Nichols-Jones</author>
	<guid>https://www.akamai.com/blog/culture/meet-jessica-scherlag-senior-manager-social-media-engagement</guid>
	<pubDate>Fri, 19 Aug 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Deploying Akamai MFA at Scale: 6 Lessons Learned </title>
	<description>Planning a multi-factor authentication (MFA) rollout? Take a look at the six lessons we learned when we deployed Akamai MFA. </description>
	<link>https://www.akamai.com/blog/security/6-lessons-learned-deploying-akamai-mfa-at-scale</link>
	<author>Keith Tomlinson</author>
	<guid>https://www.akamai.com/blog/security/6-lessons-learned-deploying-akamai-mfa-at-scale</guid>
	<pubDate>Wed, 17 Aug 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>CVE-2022-30216 - Authentication coercion of the Windows “Server” service</title>
	<description>In this blog, see how an off-by-one error could lead to domain controller access in Microsoft Server Service.</description>
	<link>https://www.akamai.com/blog/security-research/authentication-coercion-windows-server-service</link>
	<author>Akamai Security Research</author>
	<guid>https://www.akamai.com/blog/security-research/authentication-coercion-windows-server-service</guid>
	<pubDate>Sat, 13 Aug 2022 08:00:00 UTC</pubDate>

</item>
<item>
	<title>It’s Time to Protect Every SIM</title>
	<description>Ensuring the security of billions of mobile devices is a priority. Learn how Akamai aims to protect and secure every SIM as we continually adapt to new threats.</description>
	<link>https://www.akamai.com/blog/security/its-time-to-protect-every-sim</link>
	<author>Jonathan Morgan </author>
	<guid>https://www.akamai.com/blog/security/its-time-to-protect-every-sim</guid>
	<pubDate>Fri, 12 Aug 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Meet Tim Vereecke: Technical Solutions Architect</title>
	<description>Tim Vereecke, technical solutions architect at Akamai, discusses how he uses a developer-first mindset to find internet performance solutions.
</description>
	<link>https://www.akamai.com/blog/developers/meet-tim-vereecke-technical-solutions-architect</link>
	<author>Chuck Freedman</author>
	<guid>https://www.akamai.com/blog/developers/meet-tim-vereecke-technical-solutions-architect</guid>
	<pubDate>Thu, 11 Aug 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Feature Spotlight: Extending Zero Trust Segmentation to the MacOS </title>
	<description>Announcing our new agent for MacOS endpoints. Of all the leading Zero Trust segmentation providers, Akamai is the only vendor to support MacOS.</description>
	<link>https://www.akamai.com/blog/security/extending-zero-trust-segmentation-to-the-macos</link>
	<author>Ravit Greitser</author>
	<guid>https://www.akamai.com/blog/security/extending-zero-trust-segmentation-to-the-macos</guid>
	<pubDate>Wed, 10 Aug 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Has Addressed Browser-Powered Desync Attacks</title>
	<description>On August 10, 2022, security researcher James Kettle presented a set of novel HTTP request smuggling attacks in his Black Hat talk, </description>
	<link>https://www.akamai.com/blog/security/akamai-has-addressed-browser-powered-desync-attacks</link>
	<author>Kaan Onarlioglu</author>
	<guid>https://www.akamai.com/blog/security/akamai-has-addressed-browser-powered-desync-attacks</guid>
	<pubDate>Wed, 10 Aug 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Perspective on August Patch Tuesday</title>
	<description>Want the rundown of what to focus on with Patch Tuesday in one place? Check out this blog, and patch, patch, patch!</description>
	<link>https://www.akamai.com/blog/security-research/patch-tuesday-august-akamai-insights</link>
	<author>Akamai Security Research</author>
	<guid>https://www.akamai.com/blog/security-research/patch-tuesday-august-akamai-insights</guid>
	<pubDate>Wed, 10 Aug 2022 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Is Your Security Strategy Focused?</title>
	<description>Strategic security leadership is the overarching recommendation in “How to Respond to the 2022 Cyberthreat Landscape,” a new report from Gartner®. 
Download your complimentary copy in this blog.</description>
	<link>https://www.akamai.com/blog/security/is-your-security-strategy-focused</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/is-your-security-strategy-focused</guid>
	<pubDate>Tue, 09 Aug 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Cybersecurity Issues in the Gaming Industry Portend Metaverse Challenges</title>
	<description>The metaverse has greatly expanded the threat landscape. As industries gamify, gaming’s cybersecurity issues become a checklist for the future.</description>
	<link>https://www.akamai.com/blog/trends/security-trends-to-address-now-on-our-way-to-the-metaverse</link>
	<author>Jonathan Singer</author>
	<guid>https://www.akamai.com/blog/trends/security-trends-to-address-now-on-our-way-to-the-metaverse</guid>
	<pubDate>Thu, 04 Aug 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Risky Business: Determining Malicious Probabilities Through ASNs</title>
	<description>Akamai researchers have analyzed ASNs to determine some shocking stats about the state of malicious IPs and where they are from.</description>
	<link>https://www.akamai.com/blog/security/determining-malicious-probabilities-through-asns</link>
	<author>Will Rogers</author>
	<guid>https://www.akamai.com/blog/security/determining-malicious-probabilities-through-asns</guid>
	<pubDate>Tue, 02 Aug 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>India Becomes Top Global Target for API Attacks </title>
	<description>An increased adoption of APIs also increases the risk of API attacks. Read about how India has become a top global target for API attacks in 2022. </description>
	<link>https://www.akamai.com/blog/security/india-becomes-top-global-target-for-api-attacks</link>
	<author>Dean Houari</author>
	<guid>https://www.akamai.com/blog/security/india-becomes-top-global-target-for-api-attacks</guid>
	<pubDate>Thu, 28 Jul 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Largest European DDoS Attack on Record</title>
	<description>On Thursday, July 21st, Akamai detected and mitigated the largest DDoS attack ever launched against a European customer on the Prolexic platform.</description>
	<link>https://www.akamai.com/blog/security/largest-european-ddos-attack-ever</link>
	<author>Craig Sparling &amp; Max Gebhardt</author>
	<guid>https://www.akamai.com/blog/security/largest-european-ddos-attack-ever</guid>
	<pubDate>Wed, 27 Jul 2022 09:00:05 UTC</pubDate>

</item>
<item>
	<title>Power Digital Growth with App &amp; API Protector</title>
	<description>Experience “no trade-offs protection” with a free trial of Akamai App &amp; API Protector.</description>
	<link>https://www.akamai.com/blog/security/power-digital-growth-with-api-protector</link>
	<author>Danielle Walter</author>
	<guid>https://www.akamai.com/blog/security/power-digital-growth-with-api-protector</guid>
	<pubDate>Tue, 26 Jul 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: July 2022  </title>
	<description>This month’s developer update is jam-packed with exciting news, helpful articles, and useful code, including a new Terraform Provider release and much more.</description>
	<link>https://www.akamai.com/blog/developers/what-new-for-developers-july-2022</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/what-new-for-developers-july-2022</guid>
	<pubDate>Fri, 22 Jul 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>PCI DSS v4.0: Meeting Emerging Needs for Script Monitoring and Management</title>
	<description>PCI DSS v4.0 makes Akamai Client-Side Protection &amp; Compliance essential for any customer that processes or transmits cardholder data.</description>
	<link>https://www.akamai.com/blog/security/pci-dssv4-meeting-needs-for-script-monitoring-and-management</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/pci-dssv4-meeting-needs-for-script-monitoring-and-management</guid>
	<pubDate>Wed, 20 Jul 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Game On! Rooter Achieves Massive Esports Growth</title>
	<description>Learn how Rooter, India’s leading esports platform, achieved massive esports growth, delivering a gripping experience to players and fans alike. </description>
	<link>https://www.akamai.com/blog/security/game-on-rooter-achieves-massive-esports-growth</link>
	<author>Jonathan Singer</author>
	<guid>https://www.akamai.com/blog/security/game-on-rooter-achieves-massive-esports-growth</guid>
	<pubDate>Mon, 18 Jul 2022 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Cybersecurity Is a Team Sport: 3 Takeaways from Israel’s Cyber Week</title>
	<description>The future of cybersecurity relies on successful international partnerships and collaboration to ultimately thwart cybercriminals and cyberattacks.</description>
	<link>https://www.akamai.com/blog/news/cybersecurity-three-takeaways-from-israel-cyber-week</link>
	<author>Julie Klein</author>
	<guid>https://www.akamai.com/blog/news/cybersecurity-three-takeaways-from-israel-cyber-week</guid>
	<pubDate>Thu, 14 Jul 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Kit That Wants It All: Scam Mimics PayPal’s Known Security Measures</title>
	<description>Identity theft affects millions of people every year. See this piece on a scam purporting to be PayPal in an effort to gain total identity theft.</description>
	<link>https://www.akamai.com/blog/security-research/paypal-phishing-scam-mimics-known-security-measures</link>
	<author>Larry Cashdollar &amp; Aline Eliovich</author>
	<guid>https://www.akamai.com/blog/security-research/paypal-phishing-scam-mimics-known-security-measures</guid>
	<pubDate>Wed, 13 Jul 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Meet Tedd Smith: Solutions Engineer at Akamai</title>
	<description>Meet Tedd Smith, solutions engineer at Akamai. He discusses today’s media-streaming landscape and how he crafts solutions for higher-quality user experiences.</description>
	<link>https://www.akamai.com/blog/developers/meet-tedd-smith-solutions-engineer</link>
	<author>Chuck Freedman</author>
	<guid>https://www.akamai.com/blog/developers/meet-tedd-smith-solutions-engineer</guid>
	<pubDate>Thu, 07 Jul 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Ransomware Attack on Airline Industry: Turning Point for India and Others</title>
	<description>Cybercriminals are attacking organizations in the APAC region with ransomware. Learn how to implement security strategies to mitigate and recover from attacks.</description>
	<link>https://www.akamai.com/blog/security/ransomware-attack-airline-industry</link>
	<author>Dean Houari</author>
	<guid>https://www.akamai.com/blog/security/ransomware-attack-airline-industry</guid>
	<pubDate>Tue, 05 Jul 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Bloomfield Robotics Wins Funding to Feed People on Earth and in Space</title>
	<description>Akamai awarded Bloomfield Robotics $1M in cloud, compute, and security products to grow their AI business and help feed the world.</description>
	<link>https://www.akamai.com/blog/news/bloomfield-robotics-wins-funding</link>
	<author>Peter Chave</author>
	<guid>https://www.akamai.com/blog/news/bloomfield-robotics-wins-funding</guid>
	<pubDate>Fri, 01 Jul 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Observations of Confluence Zero Day (CVE-2022-26134)</title>
	<description>The Atlassian Confluence vulnerability is here to stay. See Akamai's research into the stats two weeks after the advisory was released.</description>
	<link>https://www.akamai.com/blog/security-research/atlassian-confluence-vulnerability-observations</link>
	<author>Chen Doytshman</author>
	<guid>https://www.akamai.com/blog/security-research/atlassian-confluence-vulnerability-observations</guid>
	<pubDate>Tue, 28 Jun 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: June 2022  </title>
	<description>Read about our recent Terraform updates and managed database services, our latest Meet the Developer articles, and stream videos on edge computing. </description>
	<link>https://www.akamai.com/blog/developers/whats-new-for-developers-june-2022</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/whats-new-for-developers-june-2022</guid>
	<pubDate>Fri, 24 Jun 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Relentless Evolution of DDoS Attacks</title>
	<description>Explore how DDoS attacks are practically unrecognizable from those of the past few years thanks to constant innovation in the threat landscape</description>
	<link>https://www.akamai.com/blog/security/relentless-evolution-of-ddos-attacks</link>
	<author>Craig Sparling &amp; Max Gebhardt</author>
	<guid>https://www.akamai.com/blog/security/relentless-evolution-of-ddos-attacks</guid>
	<pubDate>Thu, 23 Jun 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Bots Are Scalping Israeli Government Services</title>
	<description>Bots can be used for good, but can also be nefarious. In this post, see Akamai's research on the Israeli Gamken bot copycat.</description>
	<link>https://www.akamai.com/blog/security-research/bots-scalping-israeli-government-services</link>
	<author>Gon Avnon</author>
	<guid>https://www.akamai.com/blog/security-research/bots-scalping-israeli-government-services</guid>
	<pubDate>Thu, 23 Jun 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What's the Value of a Key-Value Store?</title>
	<description>Learn about the benefits and drawbacks of a key-value store: a data structure designed for storing and returning values associated with keys as unique identifiers.</description>
	<link>https://www.akamai.com/blog/edge/whats-the-value-of-a-key-value-store</link>
	<author>Jeffrey Costa</author>
	<guid>https://www.akamai.com/blog/edge/whats-the-value-of-a-key-value-store</guid>
	<pubDate>Fri, 17 Jun 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Meet Josh Johnson: Senior Enterprise Architect</title>
	<description>A love of technology and coding brought Josh Johnson to Akamai. Learn what he thinks a developer-first approach means for the Akamai developer community.</description>
	<link>https://www.akamai.com/blog/developers/meet-josh-johnson-senior-enterprise-architect</link>
	<author>Chuck Freedman</author>
	<guid>https://www.akamai.com/blog/developers/meet-josh-johnson-senior-enterprise-architect</guid>
	<pubDate>Thu, 16 Jun 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Panchan’s Mining Rig: New Golang Peer-to-Peer Botnet Says “Hi!”</title>
	<description>Akamai researchers have discovered a new P2P botnet targeting APJ. Read about it here.</description>
	<link>https://www.akamai.com/blog/security-research/new-p2p-botnet-panchan</link>
	<author>Stiv Kupchik</author>
	<guid>https://www.akamai.com/blog/security-research/new-p2p-botnet-panchan</guid>
	<pubDate>Wed, 15 Jun 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai: Protecting Life Online with Secure Internet Access</title>
	<description>Easily deliver value-added security services to families and businesses with Akamai Secure Internet Access services for ISPs and MNOs.</description>
	<link>https://www.akamai.com/blog/security/akamai-protecting-life-online-with-secure-internet-access</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/akamai-protecting-life-online-with-secure-internet-access</guid>
	<pubDate>Mon, 06 Jun 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>10 Years Since World IPv6 Launch</title>
	<description>A decade past World IPv6 Launch and we are well through the migration away from legacy IPv4, but still have a long way to go.</description>
	<link>https://www.akamai.com/blog/trends/10-years-since-world-ipv6-launch</link>
	<author>Erik Nygren</author>
	<guid>https://www.akamai.com/blog/trends/10-years-since-world-ipv6-launch</guid>
	<pubDate>Mon, 06 Jun 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Next Generation of HTTP</title>
	<description>The IETF just released HTTP/3, an update to HTTP that leverages new transport protocol QUIC. Learn about how the new RFCs can affect any references to HTTP.</description>
	<link>https://www.akamai.com/blog/news/the-next-generation-of-http</link>
	<author>Mike Bishop</author>
	<guid>https://www.akamai.com/blog/news/the-next-generation-of-http</guid>
	<pubDate>Mon, 06 Jun 2022 09:00:00 UTC</pubDate>

</item>
<item>
	<title>How Akamai Works with Internet Organizations </title>
	<description>Learn about a few of the internet organizations, who are developing standards and best practices, that Akamai works with to help foster innovation.</description>
	<link>https://www.akamai.com/blog/culture/how-akamai-works-with-internet-organizations</link>
	<author> Rich Salz</author>
	<guid>https://www.akamai.com/blog/culture/how-akamai-works-with-internet-organizations</guid>
	<pubDate>Fri, 03 Jun 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Protects Against the Atlassian Confluence 0-Day (CVE-2022-26134)</title>
	<description>Atlassian has released a security advisory to address a remote code execution vulnerability (CVE-2022-26134) that’s affecting Confluence Server and Data Center products. </description>
	<link>https://www.akamai.com/blog/security/akamai-protects-against-atlassian-confluence-0-day</link>
	<author>Akamai Threat Research Team</author>
	<guid>https://www.akamai.com/blog/security/akamai-protects-against-atlassian-confluence-0-day</guid>
	<pubDate>Fri, 03 Jun 2022 09:00:52 UTC</pubDate>

</item>
<item>
	<title>DNS: The Easiest Way to Exfiltrate Data?</title>
	<description>Low throughput DNS exfiltration is a slow and low attack technique that is very hard to detect. Learn how Akamai can quickly detect this in near real time.</description>
	<link>https://www.akamai.com/blog/security/dns-the-easiest-way-to-exfiltrate-data</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/dns-the-easiest-way-to-exfiltrate-data</guid>
	<pubDate>Fri, 27 May 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How Akamai’s Employees Help Us Achieve Our Sustainability Goals</title>
	<description>Learn about our commitment to environmental sustainability, Akamai Earth Month, and other campaigns that inspire employees to take action to protect the planet.</description>
	<link>https://www.akamai.com/blog/culture/akamai-employees-helping-achieve-sustainability-goals</link>
	<author>Courtney Hadden</author>
	<guid>https://www.akamai.com/blog/culture/akamai-employees-helping-achieve-sustainability-goals</guid>
	<pubDate>Thu, 26 May 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: May 2022 </title>
	<description>Read on to get information on Akamai’s new managed database service powered by Linode, to watch a fun video on DDoS attacks, and more.
</description>
	<link>https://www.akamai.com/blog/developers/whats-new-for-developers-may-2022</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/whats-new-for-developers-may-2022</guid>
	<pubDate>Wed, 25 May 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>REvil Resurgence? Or a Copycat?</title>
	<description>Has REvil returned? In this new post by Akamai's SIRT, see a DDoS incident by a threat actor claiming to be REvil.</description>
	<link>https://www.akamai.com/blog/security/revil-resurgence-or-copycat</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/revil-resurgence-or-copycat</guid>
	<pubDate>Wed, 25 May 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Meet Mike Schiessl: Senior Technical Marketing Engineer </title>
	<description>Meet Mike Schiessl to learn more about his career path, how companies can support a DevOps to DevSecOps transition, and the future of security and business.</description>
	<link>https://www.akamai.com/blog/developers/meet-senior-technical-marketing-engineer-mike-schiessl</link>
	<author>Chuck Freedman</author>
	<guid>https://www.akamai.com/blog/developers/meet-senior-technical-marketing-engineer-mike-schiessl</guid>
	<pubDate>Thu, 19 May 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>4 Steps to Prepare for Open Enrollment: Ready for Takeoff? </title>
	<description>Preparing for open enrollment is a key part of running efficient healthcare organizations, but it's difficult to know where to start. Learn which steps to take.</description>
	<link>https://www.akamai.com/blog/edge/4-steps-to-prepare-for-open-enrollment</link>
	<author>Bridget Meuse &amp; Connor Dario</author>
	<guid>https://www.akamai.com/blog/edge/4-steps-to-prepare-for-open-enrollment</guid>
	<pubDate>Tue, 17 May 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Detecting Malicious JavaScript with Secure Internet Access Enterprise Secure Web Gateway</title>
	<description>JavaScript is everywhere, and when malicious can be hugely detrimental. In this blog, learn about the types of malicious JavaScript and how Akamai's SWG product helps keep you more secure from it. </description>
	<link>https://www.akamai.com/blog/security/detecting-malicious-javascript-with-swg</link>
	<author>Jordan Garzon</author>
	<guid>https://www.akamai.com/blog/security/detecting-malicious-javascript-with-swg</guid>
	<pubDate>Fri, 13 May 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Cover 6 Core Areas of PCI Compliance with Armis and Akamai</title>
	<description>The joint security solution from Akamai Guardicore Segmentation and Armis supports PCI compliance requirements to protect consumer data across entire networks.</description>
	<link>https://www.akamai.com/blog/security/pci-compliance-armis-akamai</link>
	<author>Marco Raffaelli</author>
	<guid>https://www.akamai.com/blog/security/pci-compliance-armis-akamai</guid>
	<pubDate>Thu, 12 May 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>RPC Runtime, Take Two: Discovering a New Vulnerability</title>
	<description>Patching and bug hunting is a cyclical process. See part two of our Patch Tuesday RPC Runtime research, updated for May 2022.</description>
	<link>https://www.akamai.com/blog/security/rpc-runtime-patch-tuesday-take-two</link>
	<author>Ben Barnea</author>
	<guid>https://www.akamai.com/blog/security/rpc-runtime-patch-tuesday-take-two</guid>
	<pubDate>Tue, 10 May 2022 20:00:00 UTC</pubDate>

</item>
<item>
	<title>Protecting Your Healthcare Organization During Uncertain Times</title>
	<description>Explore three ways healthcare organizations can boost cybersecurity, critical infrastructure, and ransomware protection to prepare for potential cyberthreats.</description>
	<link>https://www.akamai.com/blog/security/protecting-your-healthcare-organization-during-uncertain-times</link>
	<author>Bridget Meuse &amp; Tony Lauro</author>
	<guid>https://www.akamai.com/blog/security/protecting-your-healthcare-organization-during-uncertain-times</guid>
	<pubDate>Mon, 09 May 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Phishing Is Still a Security Challenge</title>
	<description>Phishing is not a new security problem. In fact, it’s been around since the earliest days of email when most users received numerous emails from African kings or other high-ranking officials who promised them great riches if they simply provided their bank account details. Things have changed a lot since then. </description>
	<link>https://www.akamai.com/blog/security/phishing-security-challenge</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/phishing-security-challenge</guid>
	<pubDate>Thu, 05 May 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>An Attack Surface Workout for Web Application and API Attacks</title>
	<description>WAF Attacks have been increasing dramatically over the last 9 months. These attacks cut across industries, geos and customers. Growth has largely been driven by Local File Inclusion (lfi) attacks, which took the lead from SQL Injection attacks in early 2021 before just taking off in the fall.</description>
	<link>https://www.akamai.com/blog/security/attack-surface-workout-web-application-api-attacks</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/attack-surface-workout-web-application-api-attacks</guid>
	<pubDate>Wed, 04 May 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Zero Trust and the Fallacy of Secure Networks</title>
	<description>Talking about secure networks is like talking about safe pools. A pool is just a body of water, and if it has enough water to swim in, then it has more than enough water to drown in. A pool is inherently unsafe. We, therefore, take care in how we use a pool: We don’t swim alone; we don’t run around the pool; we don’t dive in the shallow end; and we don’t swim less than 15 minutes after eating. (Is that 15-minute rule still a thing?) These pool-safety policies ensure that our use of the pool is as safe as possible, but they do not make the pool safe in and of itself.</description>
	<link>https://www.akamai.com/blog/security/zero-trust-and-the-fallacy-of-secure-networks</link>
	<author>Robert Blumofe</author>
	<guid>https://www.akamai.com/blog/security/zero-trust-and-the-fallacy-of-secure-networks</guid>
	<pubDate>Tue, 03 May 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Platform Update: Build the Future on Akamai</title>
	<description>Today, technology is infused into nearly everything we do. The data behind personalized recommendations, connected devices, and wearables has changed how we engage with the world around us — whether we’re driving to a new destination, purchasing from a new retailer, or monitoring our health.</description>
	<link>https://www.akamai.com/blog/news/build-the-future-on-akamai</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/news/build-the-future-on-akamai</guid>
	<pubDate>Thu, 28 Apr 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Reaching the Convergence of Security and Productivity</title>
	<description>It’s all too common that IT security tools and practices come at the cost of productivity. Even physical security has this trade-off. There would be no rush to arrive at the airport an hour early if it weren’t for the extensive security measures that flying entails. As a result of this trade-off, our concern often isn’t if we can increase security in our networks — rather, it’s if the increased security is worth the impact on the business.</description>
	<link>https://www.akamai.com/blog/security/reaching-convergence-security-productivity</link>
	<author>Dan Petrillo</author>
	<guid>https://www.akamai.com/blog/security/reaching-convergence-security-productivity</guid>
	<pubDate>Tue, 26 Apr 2022 19:01:00 UTC</pubDate>

</item>
<item>
	<title>Protecting the Digital Experience</title>
	<description></description>
	<link>https://www.akamai.com/blog/news/protect-digital</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/news/protect-digital</guid>
	<pubDate>Tue, 26 Apr 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: April 2022</title>
	<description>We have big news this month. You may have already heard that we acquired Linode, creating the world’s most distributed compute platform. In addition, we have release announcements and new developer content to share with you! </description>
	<link>https://www.akamai.com/blog/developers/whats-new-for-developers-april-2022</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/whats-new-for-developers-april-2022</guid>
	<pubDate>Mon, 25 Apr 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Australia Experiences Massive Spike in WAF Multi-Vector, DDoS Attacks</title>
	<description>With web applications under increased attacks, Akamai has analyzed data points for web application firewall (WAF) multi-vector and DDoS attacks between April 2021 and March 2022 to determine the severity of the situation in Australia.</description>
	<link>https://www.akamai.com/blog/security/australia-waf-multi-vector-ddos-attacks</link>
	<author>Dean Houari</author>
	<guid>https://www.akamai.com/blog/security/australia-waf-multi-vector-ddos-attacks</guid>
	<pubDate>Thu, 21 Apr 2022 21:33:00 UTC</pubDate>

</item>
<item>
	<title>World-Class Live Streaming From the Royal Opera House </title>
	<description>Based in Covent Garden, London, the Royal Opera House brings together the world’s most extraordinary artists to share live, streamed, and broadcast events and performances. We’re delighted that this iconic British institution has chosen to work with Akamai to bring its fantastic productions to the big screen.</description>
	<link>https://www.akamai.com/blog/culture/live-streaming-from-the-royal-opera-house</link>
	<author>Ina Christova</author>
	<guid>https://www.akamai.com/blog/culture/live-streaming-from-the-royal-opera-house</guid>
	<pubDate>Thu, 21 Apr 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Making the Edge Work for You</title>
	<description>For many people, “building at the edge” may conjure fantastical images of nearly sci-fi–like computational power embedded on devices all around us, crunching massive volumes of data. We’re getting there. Today’s reality is that more workloads are moving to the edge to take advantage of the benefits, but many are still too resource-intensive to be feasible. For the workloads that can be moved, the results can lead to transformational digital experiences for users and developers alike.</description>
	<link>https://www.akamai.com/blog/edge/making-the-edge-work-for-you</link>
	<author>Renny Shen</author>
	<guid>https://www.akamai.com/blog/edge/making-the-edge-work-for-you</guid>
	<pubDate>Thu, 21 Apr 2022 09:00:00 UTC</pubDate>

</item>
<item>
	<title>Demystify Supply Chain Emissions with Akamai’s New Carbon Calculator </title>
	<description>Oftentimes, organizations view supply chains as an extension of their own business and require suppliers to adhere to codes of conduct, efficiency standards, and more. Today, this has expanded to environmental sustainability goals as well. Companies understand that the environmental impact of their economic activity is not limited to their direct operations. It’s integral to look beyond direct emissions and risks to the entire value chain.  </description>
	<link>https://www.akamai.com/blog/culture/akamai-carbon-calculator-supply-chain-emissions</link>
	<author>Teresa Shirkova</author>
	<guid>https://www.akamai.com/blog/culture/akamai-carbon-calculator-supply-chain-emissions</guid>
	<pubDate>Fri, 15 Apr 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Undetected Attacks on Anti-Malware Agents Using DNS Spoofing</title>
	<description>Although we’ve made significant progress as a community in this regard, there are still instances in which the outcome of DNS spoofing attacks can go undetected. In this article, we describe a DNS spoofing attack that goes unnoticed by users.</description>
	<link>https://www.akamai.com/blog/security/attacks-anti-malware-dns-spoofing</link>
	<author>Asaf Nadler</author>
	<guid>https://www.akamai.com/blog/security/attacks-anti-malware-dns-spoofing</guid>
	<pubDate>Thu, 14 Apr 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Picture-Perfect Gaming Experience for WorldMatch</title>
	<description>WorldMatch, a games and content provider for global markets, collaborates with some of the biggest international casinos. Headquartered in Italy and in operation since 2003, the gaming provider boasts a portfolio of more than 200 games, 160 slot machines with 70 game engines, 30 table games, and all types of video poker. We’re delighted that this innovative company has chosen to work with Akamai to deliver a picture-perfect experience for their customers via the services provider, Criticalcase.</description>
	<link>https://www.akamai.com/blog/security/worldmatch-gaming</link>
	<author>Ina Christova</author>
	<guid>https://www.akamai.com/blog/security/worldmatch-gaming</guid>
	<pubDate>Wed, 13 Apr 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Critical Remote Code Execution Vulnerabilities in Windows RPC Runtime</title>
	<description>Microsoft’s April 2022 Patch Tuesday introduced patches to more than a hundred new vulnerabilities in various components. Three critical vulnerabilities were found and patched in Windows RPC (Remote Procedure Call) runtime:
CVE-2022-24492 and CVE-2022-24528 (discovered by Yuki Chen with Cyber KunLun)
CVE-2022-26809 (discovered by BugHunter010 with Kunlun)</description>
	<link>https://www.akamai.com/blog/security/critical-remote-code-execution-vulnerabilities-windows-rpc-runtime</link>
	<author>Ben Barnea &amp; Ophir Harpaz</author>
	<guid>https://www.akamai.com/blog/security/critical-remote-code-execution-vulnerabilities-windows-rpc-runtime</guid>
	<pubDate>Wed, 13 Apr 2022 09:15:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Is a Leader in Bot Management — What That Means for You</title>
	<description>Obviously we’re proud to be a leader. Bot management is a contact sport, where being great is a requirement if you want to stop the persistent adversarial bots. So it’s rewarding to be recognized for the work we’re doing keeping the bad bots away from our customers’ digital businesses. </description>
	<link>https://www.akamai.com/blog/news/leadership-bot-management</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/news/leadership-bot-management</guid>
	<pubDate>Tue, 12 Apr 2022 15:00:00 UTC</pubDate>

</item>
<item>
	<title>Why Linode+Akamai Is Transformational for How Developers Use the Cloud</title>
	<description>Just three weeks have gone by since Akamai officially welcomed Linode into our fold, and I’m encouraged by the excitement that so many have expressed about the combination of our two companies since we announced the acquisition in February. In conversations with us, industry analysts use the word “transformational” to sum up the potential impact of our merger on the marketplace.</description>
	<link>https://www.akamai.com/blog/news/linode-akamai-transform-how-developers-use-the-cloud</link>
	<author>Tom Leighton</author>
	<guid>https://www.akamai.com/blog/news/linode-akamai-transform-how-developers-use-the-cloud</guid>
	<pubDate>Tue, 12 Apr 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Markdown Menace: Discovering an LFI Vulnerability on a Blogging Platform </title>
	<description>Protecting sensitive information is a recurring and widely known concern in the security community. As researchers, we know all too well how information can be used maliciously (I mean, come on … it’s our job). Considering the size of the threat vector that is LFI, it’s something that developers and security professionals alike need to be aware of. </description>
	<link>https://www.akamai.com/blog/security/markdown-menace</link>
	<author>Adhyayan Panwar</author>
	<guid>https://www.akamai.com/blog/security/markdown-menace</guid>
	<pubDate>Tue, 12 Apr 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Conti’s Hacker Manuals — Read, Reviewed &amp; Analyzed</title>
	<description>Conti is a notorious ransomware group that targets high-revenue organizations. They were first detected in 2020, and appear to be based in Russia. It is believed that the group is the successor to Ryuk ransomware group. According to Chainalysis, The ransomware group was the highest grossing of all ransomware groups in 2021, with an estimated revenue of at least 180 million dollars. </description>
	<link>https://www.akamai.com/blog/security-research/conti-hacker-manual-reviewed</link>
	<author>Stiv Kupchik</author>
	<guid>https://www.akamai.com/blog/security-research/conti-hacker-manual-reviewed</guid>
	<pubDate>Tue, 05 Apr 2022 18:00:00 UTC</pubDate>

</item>
<item>
	<title>Spring Cloud Function SpEL Injection (CVE-2022-22963) Exploited in the Wild</title>
	<description>Although Spring Cloud Functions are not as widespread as the Log4j library, and should provide a good separation from the hosting server, some draw the line between the two, due to the ease of exploitation over HTTP/s. This new vulnerability will definitely result in many threat actors launching campaigns for crypto-mining, ddos, ransomware, and as a golden ticket to break into organizations for the next years to come.</description>
	<link>https://www.akamai.com/blog/security/spring-cloud-function</link>
	<author>Akamai Threat Research Team</author>
	<guid>https://www.akamai.com/blog/security/spring-cloud-function</guid>
	<pubDate>Thu, 31 Mar 2022 19:30:00 UTC</pubDate>

</item>
<item>
	<title>Mitigating Spring Core “Spring4Shell” Zero-Day</title>
	<description>When Spring, the Java-based application, fell victim to cyberattacks, Akamai's Adaptive Security Engine detected zero-day attacks and protected customers against them.</description>
	<link>https://www.akamai.com/blog/security/spring-core-spring4shell-zero-day</link>
	<author>Akamai Threat Research Team</author>
	<guid>https://www.akamai.com/blog/security/spring-core-spring4shell-zero-day</guid>
	<pubDate>Thu, 31 Mar 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Meet Anthony Hogg: Senior Enterprise Architect and Lifelong Learner</title>
	<description>At Akamai and across the tech industry at large, best practices and tools are constantly evolving. To keep up with these changes, a passion for learning is key, especially among those who support and enable others. One Senior Enterprise Architect on Akamai’s Advanced Solutions team, Anthony Hogg, truly embodies this value. </description>
	<link>https://www.akamai.com/blog/developers/meet-anthony-hogg-enterprise-architect</link>
	<author>Chuck Freedman</author>
	<guid>https://www.akamai.com/blog/developers/meet-anthony-hogg-enterprise-architect</guid>
	<pubDate>Wed, 30 Mar 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Welcome to Edge Diagnostics</title>
	<description>After more than a year of dedication and hard work, we are delighted to officially announce the launch of our new Edge Diagnostics application on March 30, 2022. Diagnosing network and content issues quickly and effectively is critical to your success! Therefore the aim is to make the existing diagnostic tools faster, easier to navigate, more user-friendly, and with improved functionality and a developer focus in mind.
</description>
	<link>https://www.akamai.com/blog/news/welcome-to-edge-diagnostics</link>
	<author>Amit Mohanty</author>
	<guid>https://www.akamai.com/blog/news/welcome-to-edge-diagnostics</guid>
	<pubDate>Wed, 30 Mar 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>A Fast and Seamless Gaming Experience for Gameloft </title>
	<description>Gameloft is a leading gaming provider with more than 20 years of history. The company, created in 2000, has a passion for games and a desire to distribute them to even more players around the world. By bringing the wonders of games to mobile devices and, now, to all digital platforms, Gameloft has helped to create an entirely new market that has become the biggest one in gaming. We’re very excited that this company, which has revolutionized the gaming industry, has chosen to work with Akamai.</description>
	<link>https://www.akamai.com/blog/security/gameloft</link>
	<author>Ina Christova</author>
	<guid>https://www.akamai.com/blog/security/gameloft</guid>
	<pubDate>Tue, 29 Mar 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Accelerator Program: Technological Solutions for India’s Water Crisis</title>
	<description>Akamai’s India Corporate Social Responsibility (CSR) Trust is helping to tackle this major challenge. In accordance with the country’s CSR mandates, the trust allocates 2% of the branch’s revenue to CSR programs. Its flagship initiative is the Akamai Accelerator Program, which supports innovators who use scalable and sustainable technologies to solve India’s water crisis. As the impacts of climate change accelerate, so must we.</description>
	<link>https://www.akamai.com/blog/culture/water-crisis-tech-solutions</link>
	<author>Neha Jain</author>
	<guid>https://www.akamai.com/blog/culture/water-crisis-tech-solutions</guid>
	<pubDate>Mon, 28 Mar 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: March 2022 </title>
	<description>We have some excellent highlights this month. We’re excited to announce new videos, useful articles, an event recap, and much more.</description>
	<link>https://www.akamai.com/blog/developers/whats-new-for-developers-march-2022</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/whats-new-for-developers-march-2022</guid>
	<pubDate>Fri, 25 Mar 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What's Driving Multi-Factor Authentication Adoption?</title>
	<description>The need for businesses to deploy MFA for the protection of employee accounts has never been greater — according to the latest Verizon Data Breach report, nearly 80% of data breaches involve the use of stolen or compromised employee credentials and brute force logins. </description>
	<link>https://www.akamai.com/blog/security/mfa-adoption</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/mfa-adoption</guid>
	<pubDate>Thu, 24 Mar 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai and Linode: Giving Developers One Place to Build, Run, and Secure Apps</title>
	<description>I am incredibly excited to announce that today we have completed the acquisition of Linode. You may have seen our press release announcing the acquisition, or listened to our earnings call during which our executives discussed why this is the right strategic investment for Akamai. But I wanted to use this opportunity to highlight why, as a technologist, this is such an important step forward for both Akamai and Linode, and what you can expect to see from us in the future. </description>
	<link>https://www.akamai.com/blog/news/akamai-and-linode</link>
	<author>Noam Freedman</author>
	<guid>https://www.akamai.com/blog/news/akamai-and-linode</guid>
	<pubDate>Mon, 21 Mar 2022 08:05:00 UTC</pubDate>

</item>
<item>
	<title>Adding Akamai Shared Domains to the Public Suffix List</title>
	<description>Akamai plans to submit a number of our shared domains to the “PRIVATE” section of the Public Suffix List (PSL) at some point on or after March 31, 2022. The PSL contains multi-party domain suffixes and is used by a wide range of client software (for example, web browsers) to implement policy decisions, such as to prevent cookies from being set on public or multi-party domains.</description>
	<link>https://www.akamai.com/blog/developers/adding-akamai-shared-domains-to-the-public-suffix-list</link>
	<author>Erik Nygren</author>
	<guid>https://www.akamai.com/blog/developers/adding-akamai-shared-domains-to-the-public-suffix-list</guid>
	<pubDate>Mon, 21 Mar 2022 05:00:00 UTC</pubDate>

</item>
<item>
	<title>The “PhoneHome” DDoS Attack — Everything You Need to Know</title>
	<description>A vulnerability in enterprise collaboration suite MiCollab by telecommunications company Mitel has been abused for distributed denial-of-service (DDoS) attacks with record-breaking amplification potential.</description>
	<link>https://www.akamai.com/blog/security/phonehome-ddos-attack</link>
	<author>Sven Dummer</author>
	<guid>https://www.akamai.com/blog/security/phonehome-ddos-attack</guid>
	<pubDate>Thu, 17 Mar 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Is a Leader in Forrester New Wave: Microsegmentation</title>
	<description>We are excited to be named a Leader in The Forrester New Wave™: Microsegmentation, Q1 2022. We were evaluated alongside eight other vendors in the microsegmentation space and ranked in 10 criteria, including product vision, interface and reporting, host agents, agentless aspect, product, and services support.</description>
	<link>https://www.akamai.com/blog/security/akamai-microsegmentation</link>
	<author>Ravit Greitser</author>
	<guid>https://www.akamai.com/blog/security/akamai-microsegmentation</guid>
	<pubDate>Tue, 15 Mar 2022 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Six Key Takeaways from the OMB Memo</title>
	<description>In May 2021, following a number of high-profile security incidents, U.S. President Biden issued an executive order that set out a high-level agenda to modernize and improve the government’s cyber resilience. This January, the U.S. Office of Management and Budget (OMB) issued a memo to the heads of executive departments and agencies that gave much more detail on how the U.S. government will move toward Zero Trust security principles.</description>
	<link>https://www.akamai.com/blog/security/omb-memo</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/omb-memo</guid>
	<pubDate>Fri, 11 Mar 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>In China and Japan, Malicious Botnets Surge Amidst Holiday Ecommerce Traffic</title>
	<description>Akamai data shows that in the days leading up to and including Lunar New Year, the activity of malicious bots increased 15% in China over the previous month. While a similar surge occurs during the high-traffic seen at the end-of-year holidays in EMEA and the U.S. — China and Japan present a particularly enticing opportunity for successful cyberattacks because of the sheer volume in traffic: Retailers and ecommerce here serve some of the largest populations in the world. </description>
	<link>https://www.akamai.com/blog/security/china-and-japan-holiday-botnets</link>
	<author>Boaz Gelbord</author>
	<guid>https://www.akamai.com/blog/security/china-and-japan-holiday-botnets</guid>
	<pubDate>Thu, 10 Mar 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>DNS Cybersquatting: The Case for Edge DNS Zone Protect</title>
	<description>Cybersquatting, also known as domain squatting, is a type of scam that mimics a brand's domain to confuse potential victims and gain their trust. According to Revision Legal, “Cybersquatting is prohibited in the U.S. by federal law under the Anticybersquatting Consumer Protection Act (ACPA.)” These fake domains can be used in cyberattacks — especially phishing attacks. </description>
	<link>https://www.akamai.com/blog/security/dns-cybersquatting</link>
	<author>Noy Aizenberg</author>
	<guid>https://www.akamai.com/blog/security/dns-cybersquatting</guid>
	<pubDate>Thu, 10 Mar 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>The Akamai Foundation: Making a Global Impact </title>
	<description>In 2021, the impact of the Akamai Foundation’s philanthropic activities continued to expand beyond science, technology, engineering, and mathematics (STEM) education, deepening our commitment to digital equity and inclusion around the globe and to making a positive impact in the communities we serve. </description>
	<link>https://www.akamai.com/blog/news/akamai-foundation-global-impact</link>
	<author>Kim Salem-Jackson</author>
	<guid>https://www.akamai.com/blog/news/akamai-foundation-global-impact</guid>
	<pubDate>Wed, 09 Mar 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Greenwashing or Legit? </title>
	<description>I think we can all agree that sustainability is one of the most important topics that we will discuss this year. It's driving consumer habits, business practices, and investment decisions. And it’s a discussion that’s happening at every level of the business; from procurement all the way up to the boardroom. </description>
	<link>https://www.akamai.com/blog/trends/greenwashing</link>
	<author>Natalie Billingham</author>
	<guid>https://www.akamai.com/blog/trends/greenwashing</guid>
	<pubDate>Wed, 09 Mar 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>How We’re Conserving Energy While Energizing Online Experiences </title>
	<description>I’ve always loved building things. At Akamai, I get to be part of a team that builds amazing things — things that power and protect online experiences and make life better for billions of people, billions of times a day. But delivering those online experiences comes with a catch. </description>
	<link>https://www.akamai.com/blog/news/conserving-energy</link>
	<author>Robert Blumofe</author>
	<guid>https://www.akamai.com/blog/news/conserving-energy</guid>
	<pubDate>Tue, 08 Mar 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>CVE-2022-26143: TP240PhoneHome Reflection/Amplification DDoS Attack Vector</title>
	<description>A new reflection/amplification distributed denial of service (DDoS) vector with a record-breaking potential amplification ratio of 4,294,967,296:1 has been abused by attackers in the wild to launch multiple high-impact DDoS attacks.</description>
	<link>https://www.akamai.com/blog/security/phone-home-ddos-attack-vector</link>
	<author>Chad Seaman</author>
	<guid>https://www.akamai.com/blog/security/phone-home-ddos-attack-vector</guid>
	<pubDate>Tue, 08 Mar 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>What Does Fishing for Rebar Have to Do with Building a More Sustainable Internet?</title>
	<description>Danny Lewin Community Care Days (DLCCDs) are a celebration of our late co-founder Danny Lewin’s generous spirit and his tenacious appetites for collaboration, innovation, and (especially) giving back to our global community. DLCCDs bring to life our values and empower all Akamai employees to volunteer in the communities where we work, operate, and live.</description>
	<link>https://www.akamai.com/blog/culture/fishing-for-rebar</link>
	<author>Mike Mattera</author>
	<guid>https://www.akamai.com/blog/culture/fishing-for-rebar</guid>
	<pubDate>Mon, 07 Mar 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Actions Akamai Is Taking on Russia and Ukraine</title>
	<description>Akamai stands with the people of Ukraine. As the assault on Ukraine continues, we are inspired by the courageous citizens defending their sovereignty. </description>
	<link>https://www.akamai.com/blog/news/ukraine-statement</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/news/ukraine-statement</guid>
	<pubDate>Mon, 07 Mar 2022 12:59:00 UTC</pubDate>

</item>
<item>
	<title>Powering and Protecting Online Privacy:  iCloud Private Relay and Information for Akamai Customers</title>
	<description>See how Apple worked with Akamai to launch iCloud Private Relay. Learn about the service and how it can be best leveraged for Akamai customers.</description>
	<link>https://www.akamai.com/blog/cloud/powering-and-protecting-online-privacy-icloud-private-relay</link>
	<author>Kit Knox</author>
	<guid>https://www.akamai.com/blog/cloud/powering-and-protecting-online-privacy-icloud-private-relay</guid>
	<pubDate>Wed, 02 Mar 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Creating a More Diverse Tech Future with the Akamai Foundation</title>
	<description>2021, a year of creating a more diverse tech future with The Akamai Foundation.</description>
	<link>https://www.akamai.com/blog/culture/akamai-foundation-diverse-tech-future</link>
	<author>Kara DiGiacomo</author>
	<guid>https://www.akamai.com/blog/culture/akamai-foundation-diverse-tech-future</guid>
	<pubDate>Tue, 01 Mar 2022 15:00:00 UTC</pubDate>

</item>
<item>
	<title>TCP Middlebox Reflection: Coming to a DDoS Near You</title>
	<description>Over the past week, Akamai Security Researchers have detected and analyzed a series of TCP reflection attacks, peaking at 11 Gbps at 1.5 Mpps, that were leveled against Akamai customers. The attack, amplified with a technique called TCP Middlebox Reflection, abuses vulnerable firewalls and content filtering systems to reflect and amplify TCP traffic to a victim machine, creating a powerful DDoS attack. </description>
	<link>https://www.akamai.com/blog/security/tcp-middlebox-reflection</link>
	<author>Security Intelligence Response Team</author>
	<guid>https://www.akamai.com/blog/security/tcp-middlebox-reflection</guid>
	<pubDate>Tue, 01 Mar 2022 13:38:00 UTC</pubDate>

</item>
<item>
	<title>Geopolitical Tensions Increase Risk of DDoS Attacks Among Other Damaging Intrusions</title>
	<description>With Ukraine moving beyond the brink of war with an official invasion by Russia underway, organizations both near and afar must brace for potential repercussions in the form of crippling cyberattacks and intrusions. Already Ukraine has been bombarded with DDoS assaults aimed at taking down government sites, communication providers, and financial institutions. </description>
	<link>https://www.akamai.com/blog/security/increasing-ddos-attacks-geopolitical-tension</link>
	<author>Craig Sparling</author>
	<guid>https://www.akamai.com/blog/security/increasing-ddos-attacks-geopolitical-tension</guid>
	<pubDate>Fri, 25 Feb 2022 22:32:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: February 2022</title>
	<description>A lot has happened since we published our January recap blog. Akamai launched a new documentation site on readme.io, we started a new season of Terraform Tapas, and we saw many amazing contributions from our Developer Champions.</description>
	<link>https://www.akamai.com/blog/developers/whats-new-for-developers-february-2022</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/whats-new-for-developers-february-2022</guid>
	<pubDate>Fri, 25 Feb 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Operational Readiness and Response to the Ukraine Crisis</title>
	<description>Akamai’s security and network teams use our vast view of internet activity to closely monitor and act upon potential cyber threats, and we are taking appropriate measures to review our defensive posture and ensure the integrity of Akamai systems and the Akamai network. </description>
	<link>https://www.akamai.com/blog/security/operational-readiness-response-to-ukraine-crisis</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/security/operational-readiness-response-to-ukraine-crisis</guid>
	<pubDate>Thu, 24 Feb 2022 22:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Wins Brandon Hall Award for Best Learning Technology</title>
	<description>The Technical Enablement and Education team, part of Akamai’s Global Services organization, has won a coveted Brandon Hall Group silver medal for “Excellence in Technology,” for their automatic hands-on Lab Validation System (LVS). The automatic LVS is used throughout Global Service training courses, as well as in Channel Partner product certification, to provide real-time evaluations quickly and accurately for hands-on lab training associated with learning how to implement Akamai products.  
</description>
	<link>https://www.akamai.com/blog/news/akamai-wins-brandon-hall-award</link>
	<author>Magdalena Frankiewicz</author>
	<guid>https://www.akamai.com/blog/news/akamai-wins-brandon-hall-award</guid>
	<pubDate>Thu, 24 Feb 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>A Definitive Guide to the Remote Procedure Call (RPC) Filter</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/guide-rpc-filter</link>
	<author>Ophir Harpaz &amp; Stiv Kupchik</author>
	<guid>https://www.akamai.com/blog/security/guide-rpc-filter</guid>
	<pubDate>Wed, 23 Feb 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Adding Multi-Factor Authentication to Employee Logins: A Sound Security Principle </title>
	<description>The year 2021 was definitely challenging for security practitioners. The number of data breaches continued to rise; a report issued by the Identity Theft Resource Center stated that the total number of breaches in the first three quarters of 2021 exceeded the total number of events in all of 2020 by 17%. </description>
	<link>https://www.akamai.com/blog/security/adding-multi-factor-authentication</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/adding-multi-factor-authentication</guid>
	<pubDate>Tue, 22 Feb 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Meet Mike Elissen: Founder of Our Akamai Developer Champions Program </title>
	<description>Our longest-standing Developer Advocate, Mike Elissen, noticed an opportunity to make Akamai’s developer relations even stronger. He co-created Developer Champions, an advocacy program that helps Akamai employees better meet customer needs. </description>
	<link>https://www.akamai.com/blog/developers/meet-mike-elissen-founder-of-our-akamai-developer-champions-program</link>
	<author>Chuck Freedman</author>
	<guid>https://www.akamai.com/blog/developers/meet-mike-elissen-founder-of-our-akamai-developer-champions-program</guid>
	<pubDate>Fri, 18 Feb 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Building the Future — Akamai’s Outlook on the Linode Acquisition</title>
	<description>Akamai announced our intent to acquire Linode. The acquisition is intended to create the world’s most distributed compute platform. This new cloud to edge platform will make it easier for developers and businesses to build, run, and secure applications, especially given the complexities of Web3.</description>
	<link>https://www.akamai.com/blog/news/building-the-future-akamai-and-linode</link>
	<author>Adam Karon</author>
	<guid>https://www.akamai.com/blog/news/building-the-future-akamai-and-linode</guid>
	<pubDate>Thu, 17 Feb 2022 15:00:00 UTC</pubDate>

</item>
<item>
	<title>1&amp;1 Versatel Expands Its Business Portfolio in Germany with Akamai</title>
	<description>1&amp;1 Versatel is a B2B provider for fibre gigabit connections and network-related services in Germany. The company is part of the United Internet AG and as such a sister company of 1&amp;1 AG. 1&amp;1 Versatel operates one of the biggest and most powerful fibre networks in Germany - providing its own network in more than 250 German cities and has implemented over 50,000 business customer solutions. We’re delighted that such an innovative company has chosen to partner with Akamai to increase the reach of its customer base to include smaller enterprises and to make its operations secure.</description>
	<link>https://www.akamai.com/blog/news/versatel-expands-portfolio-with-akamai</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/news/versatel-expands-portfolio-with-akamai</guid>
	<pubDate>Thu, 17 Feb 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Compliance with Cross-border Transfer Laws</title>
	<description>Akamai is compliant with applicable data privacy regulations in countries where we and our customers conduct business. This is a fundamental tenet of our company’s core values. After all, when you make life better for billions of people, billions of times a day, there’s an expectation that you will also protect their lives online. And that is exactly what we do. </description>
	<link>https://www.akamai.com/blog/security/akamai-data-privacy-compliance</link>
	<author>James Casey</author>
	<guid>https://www.akamai.com/blog/security/akamai-data-privacy-compliance</guid>
	<pubDate>Wed, 16 Feb 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Log4j Bringing You Down? Try Infection Monkey’s New Log4Shell Attack Simulation</title>
	<description>What if you could see how a real cyberattack might unfold in your network? Imagine the insights you would gain into your security posture if you could safely and easily simulate the behavior of malicious actors before they hit your defenses. That’s what the Infection Monkey does.</description>
	<link>https://www.akamai.com/blog/security/infection-monkey-new-log4shell-simulation</link>
	<author>The Infection Monkey team</author>
	<guid>https://www.akamai.com/blog/security/infection-monkey-new-log4shell-simulation</guid>
	<pubDate>Mon, 14 Feb 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Why You Shouldn't Tie IP Addresses to Tokens</title>
	<description>Locking tokens to the client IP address might seem like a good way to prevent content theft, such as sharing of authenticated URLs that include tokens. It might even appear to work in small-scale test environments. However, the internet has evolved to a point where it’s quite common for clients to use multiple source IP addresses. This is especially true when a token is created by a server on one hostname (such as a CMS) but then validated by a server on another hostname, such as an Akamai edge server, when serving content. </description>
	<link>https://www.akamai.com/blog/developers/why-you-shouldn-t-tie-ip-addresses-to-tokens</link>
	<author>Alex Balford &amp; Erik Nygren</author>
	<guid>https://www.akamai.com/blog/developers/why-you-shouldn-t-tie-ip-addresses-to-tokens</guid>
	<pubDate>Fri, 11 Feb 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Exceptional Brand Experiences Go Far Beyond the 30-Second Super Bowl Ad</title>
	<description>Super Bowl LVI is almost here, and with that comes one of my favorite pastimes: watching the commercials! And you know I’m not alone — 30% of viewers tune in to the big game primarily to see the commercials, upping the pressure on CMOs to “get it right.” But winning the hearts and minds of the more than 100 million anticipated viewers goes far beyond creating a captivating 30- or 60-second spot. In fact, the production, supporting digital assets, celebrity endorsements, talking animals, etc. just scratch the surface when it comes to delivering an exceptional brand experience. </description>
	<link>https://www.akamai.com/blog/security/power-and-protect-your-brand-during-the-big-game-and-beyond</link>
	<author>Kim Salem-Jackson</author>
	<guid>https://www.akamai.com/blog/security/power-and-protect-your-brand-during-the-big-game-and-beyond</guid>
	<pubDate>Fri, 11 Feb 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Welcome to Akamai TechDocs</title>
	<description>We're pleased to announce the launch of Akamai’s brand-new documentation site: techdocs.akamai.com. Powered by ReadMe, our new site offers intuitive and interactive content designed to help you get the most out of your Akamai products.  </description>
	<link>https://www.akamai.com/blog/developers/welcome-to-akamai-techdocs</link>
	<author>Beth Favini</author>
	<guid>https://www.akamai.com/blog/developers/welcome-to-akamai-techdocs</guid>
	<pubDate>Thu, 10 Feb 2022 20:40:00 UTC</pubDate>

</item>
<item>
	<title>An Unprecedented Opportunity to Build Dynamic, Secure Broadband Access for All of the U.S.</title>
	<description>All Americans, regardless of background or location, deserve a fast, safe, and reliable digital experience. Whether in Silicon Valley, rural Montana, or an underserved area in Chicago, entrepreneurs, businesses, and consumers should be on an equal footing online. Unfortunately, that is not the current reality, and the pandemic only amplified and exacerbated the existing digital divides we know so well.</description>
	<link>https://www.akamai.com/blog/news/dynamic-secure-broadband-access</link>
	<author>Lauren Van Wazer &amp; Robert Blumofe</author>
	<guid>https://www.akamai.com/blog/news/dynamic-secure-broadband-access</guid>
	<pubDate>Thu, 10 Feb 2022 19:00:31 UTC</pubDate>

</item>
<item>
	<title>FritzFrog: P2P Botnet Hops Back on the Scene</title>
	<description>FritzFrog is a peer-to-peer botnet, which means its command and control server is not limited to a single, centralized machine, but rather can be done from every machine in its distributed network. In other words, every host running the malware process becomes part of the network, and is capable of sending, receiving, and executing the commands to control machines in the network.</description>
	<link>https://www.akamai.com/blog/security-research/fritzfrog-p2p</link>
	<author>Ben Barnea, Shiran Guez &amp; Ophir Harpaz</author>
	<guid>https://www.akamai.com/blog/security-research/fritzfrog-p2p</guid>
	<pubDate>Thu, 10 Feb 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>A New Approach to Blocking Malicious JavaScript</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/new-approach-blocking-malicious-javaScript</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/new-approach-blocking-malicious-javaScript</guid>
	<pubDate>Wed, 09 Feb 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s New for Developers: January 2022</title>
	<description>Hello, and welcome to our very first Developer Community update of 2022. In this new monthly series, we’ll share highlights of what is happening across the Akamai Developer Community. Since this is the first blog we’re posting, we will also catch up on news from October 2021 through today.</description>
	<link>https://www.akamai.com/blog/developers/whats-new-for-developers-january-2022</link>
	<author>Jessica Capuano Mora</author>
	<guid>https://www.akamai.com/blog/developers/whats-new-for-developers-january-2022</guid>
	<pubDate>Mon, 31 Jan 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Universal Plug and Play (UPnP): What You Need to Know</title>
	<description>Universal Plug and Play (UPnP) is a widely used protocol with a decade-long history of flawed implementations across a wide range of consumer devices. In this paper, we will cover how these aws are still present on devices, how these vulnerabilities are actively being abused, and how a feature/vulnerability set that seems to be mostly forgotten could lead to continued problems in the future with DDoS, account takeover, and malware distribution.</description>
	<link>https://www.akamai.com/blog/security/universal-plug-and-play-upnp-what-you-need-to-know</link>
	<author>Akamai SIRT</author>
	<guid>https://www.akamai.com/blog/security/universal-plug-and-play-upnp-what-you-need-to-know</guid>
	<pubDate>Thu, 27 Jan 2022 20:00:00 UTC</pubDate>

</item>
<item>
	<title>UPnProxy: Eternal Silence</title>
	<description>UPnProxy is alive and well. There are 277,000 devices, out of a pool of 3.5 million, running vulnerable implementations of UPnP. Of those, Akamai can confirm that more than 45,000 have been compromised in a widely distributed UPnP NAT injection campaign. </description>
	<link>https://www.akamai.com/blog/security/upnproxy-eternal-silence</link>
	<author>Chad Seaman</author>
	<guid>https://www.akamai.com/blog/security/upnproxy-eternal-silence</guid>
	<pubDate>Thu, 27 Jan 2022 19:30:00 UTC</pubDate>

</item>
<item>
	<title>Combat Piracy with Akamai Managed Content Protection</title>
	<description>Learn how Akamai’s Managed Content Protection offering helps combat and mitigate the growing effects of online piracy for Akamai customers.</description>
	<link>https://www.akamai.com/blog/security-research/combat-piracy-with-akamai-managed-content-protection</link>
	<author>Harish Menon</author>
	<guid>https://www.akamai.com/blog/security-research/combat-piracy-with-akamai-managed-content-protection</guid>
	<pubDate>Wed, 26 Jan 2022 11:30:00 UTC</pubDate>

</item>
<item>
	<title>Deploying Zero Trust Network Access for Secure Application Access? Don’t Forget to Secure Your Employees</title>
	<description>Secure your workforce with the help of multi-factor authentication and Akamai's Zero Trust Network Access application in place of a virtual private network (VPN).</description>
	<link>https://www.akamai.com/blog/security/deploying-zero-trust-network-access-for-secure-application-access-dont-forget-to-secure-your-employees</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/deploying-zero-trust-network-access-for-secure-application-access-dont-forget-to-secure-your-employees</guid>
	<pubDate>Tue, 25 Jan 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>The Crypto Revolution Reaches Fever Pitch for Today’s Phishing Scammers</title>
	<description>Akamai threat researchers tracked continuous cyberattack and crypto-phishing campaigns that took advantage of cryptocurrency-based scams.</description>
	<link>https://www.akamai.com/blog/security/the-crypto-revolution-reaches-fever-pitch-for-todays-phishing-scammers</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/the-crypto-revolution-reaches-fever-pitch-for-todays-phishing-scammers</guid>
	<pubDate>Thu, 20 Jan 2022 15:00:00 UTC</pubDate>

</item>
<item>
	<title>We Need to Encrypt DNS: Here’s Another Compelling Reason Why</title>
	<description>Encrypting DNS servers is a necessary next step in web security to prevent sensitive materials from being breached, thus improving user privacy and security.</description>
	<link>https://www.akamai.com/blog/security/we-need-to-encrypt-dns-heres-another-compelling-reason-why</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/we-need-to-encrypt-dns-heres-another-compelling-reason-why</guid>
	<pubDate>Wed, 19 Jan 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Mirai Botnet Abusing Log4j Vulnerability</title>
	<description>Threat Researcher Larry Cashdollar has discovered evidence of the Mirai botnet abusing Log4j vulnerability and shares code examples.</description>
	<link>https://www.akamai.com/blog/security/mirai-botnet-abusing-log4j-vulnerability</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/mirai-botnet-abusing-log4j-vulnerability</guid>
	<pubDate>Tue, 18 Jan 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>A Log4j Retrospective Part 4: 5 Lessons Learned from Log4j</title>
	<description>Read about strategies to help protect against new and more impactful security threats and vulnerabilities in Log4j from Akamai CTO Charlie Gero. </description>
	<link>https://www.akamai.com/blog/security/a-log4j-retrospective-part-4-5-lessons-learned-from-log4j</link>
	<author>Charlie Gero</author>
	<guid>https://www.akamai.com/blog/security/a-log4j-retrospective-part-4-5-lessons-learned-from-log4j</guid>
	<pubDate>Thu, 13 Jan 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>A Log4j Retrospective  Part 3: Evolution — Payloads and Attack Diversification</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/a-log4j-retrospective-part-3-evolution-payloads-and-attack-diversification</link>
	<author>Charlie Gero</author>
	<guid>https://www.akamai.com/blog/security/a-log4j-retrospective-part-3-evolution-payloads-and-attack-diversification</guid>
	<pubDate>Wed, 12 Jan 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Discover and Announce: A Serverless Location Application Built on Akamai IoT Edge Connect</title>
	<description>Learn about Discover and Announce, a 100% serverless application built on Akamai IoT Edge Connect, which can run entirely on the Akamai edge.</description>
	<link>https://www.akamai.com/blog/edge/discover-and-announce-a-serverless-location-application-built-on-akamai-iot-edge-connect</link>
	<author>Brian Apley</author>
	<guid>https://www.akamai.com/blog/edge/discover-and-announce-a-serverless-location-application-built-on-akamai-iot-edge-connect</guid>
	<pubDate>Tue, 11 Jan 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>A Log4j Retrospective Part 2: Data Exfiltration and Remote Code Execution Exploits</title>
	<description>Akamai CTO Charlie Gero shows how the Log4j threat surface could extend to unpatchable embedded and IoT devices.</description>
	<link>https://www.akamai.com/blog/security/a-log4j-retrospective-part-2-data-exfiltration-and-remote-code-execution-exploits</link>
	<author>Charlie Gero</author>
	<guid>https://www.akamai.com/blog/security/a-log4j-retrospective-part-2-data-exfiltration-and-remote-code-execution-exploits</guid>
	<pubDate>Mon, 10 Jan 2022 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Abuse and Fraud Prevention's Co-Created Future — Predictions for 2022 and Beyond</title>
	<description>Explore some of the Akamai Abuse and Fraud Prevention team’s predictions for the future of abuse and fraud protection in 2022 and beyond.</description>
	<link>https://www.akamai.com/blog/security/abuse-and-fraud-preventions-co-created-future-predictions-for-2022-and-beyond</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/abuse-and-fraud-preventions-co-created-future-predictions-for-2022-and-beyond</guid>
	<pubDate>Fri, 07 Jan 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>A Log4j Retrospective Part 1: Vulnerability Background</title>
	<description>Learn about the widely used Java-based logging library Log4j and how its vulnerability and other capabilities presented a major opportunity to attackers.</description>
	<link>https://www.akamai.com/blog/security/a-log4j-retrospective</link>
	<author>Charlie Gero</author>
	<guid>https://www.akamai.com/blog/security/a-log4j-retrospective</guid>
	<pubDate>Fri, 07 Jan 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Secure Your Kubernetes Clusters to Stop Ransomware</title>
	<description>While containers offer speed and flexibility that have not been possible before in the data center, they are also exposed to security threats such as ransomware, cryptomining, and botnets.</description>
	<link>https://www.akamai.com/blog/security/secure-your-kubernetes-clusters-to-stop-ransomware</link>
	<author>Ravit Greitser &amp; Yuval Goldberg</author>
	<guid>https://www.akamai.com/blog/security/secure-your-kubernetes-clusters-to-stop-ransomware</guid>
	<pubDate>Fri, 07 Jan 2022 14:00:00 UTC</pubDate>

</item>
<item>
	<title>The Great Christmas Download</title>
	<description>Video game downloads and console updates helped game industry traffic peak at 125% above average on Christmas day according to Akamai, which supports more than 225 game publishers globally.</description>
	<link>https://www.akamai.com/blog/trends/the-great-christmas-download</link>
	<author>Chris Nicholson</author>
	<guid>https://www.akamai.com/blog/trends/the-great-christmas-download</guid>
	<pubDate>Wed, 05 Jan 2022 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Keeping Up with the Botnets</title>
	<description>It’s no secret that the global pandemic increased opportunities for threat actors and cybercriminals to target financial services. Throughout 2020, scammers used the economic tension caused by COVID-19 — the promise of financial assistance, the stress of financial hardship — to target people across the globe via phishing attacks. </description>
	<link>https://www.akamai.com/blog/trends/keeping-up-with-the-botnets</link>
	<author>Gerhard Giese</author>
	<guid>https://www.akamai.com/blog/trends/keeping-up-with-the-botnets</guid>
	<pubDate>Tue, 28 Dec 2021 14:00:06 UTC</pubDate>

</item>
<item>
	<title>Our Journey to Detect Log4j-Vulnerable Machines</title>
	<description>Log4Shell (CVE-2021-44228) is a remote code execution (RCE) vulnerability in the Apache-foundation open-source logging library Log4j. It was published on December 9, 2021, and then all hell broke loose. As Log4j is a common logging library for Java applications, it is highly widespread.</description>
	<link>https://www.akamai.com/blog/security/our-journey-to-detect-log4j-vulnerable-machines</link>
	<author>Stiv Kupchik</author>
	<guid>https://www.akamai.com/blog/security/our-journey-to-detect-log4j-vulnerable-machines</guid>
	<pubDate>Mon, 27 Dec 2021 19:30:00 UTC</pubDate>

</item>
<item>
	<title>The Everyday Impacts of Diversity and Inclusion at Akamai</title>
	<description>To me, Diversity &amp; Inclusion means a new way of thinking and engaging with society. It seems to be one of the most popular phrases that every person sees on the internet every day. I have been appointed as an ambassador of D&amp;I for Akamai’s Asia-Pacific Japan region, and have been learning the essential principles along with some of my colleagues for the past several months. </description>
	<link>https://www.akamai.com/blog/culture/the-everyday-impacts-of-diversity-and-inclusion-at-akamai</link>
	<author>Hisashi Yamaguchi</author>
	<guid>https://www.akamai.com/blog/culture/the-everyday-impacts-of-diversity-and-inclusion-at-akamai</guid>
	<pubDate>Thu, 23 Dec 2021 20:30:00 UTC</pubDate>

</item>
<item>
	<title>Why I’m Proud to Protect Billions of People Worldwide</title>
	<description>I decided to pursue a career in IT after working as a support engineer for internal employees as part of my very first job. It immediately opened my eyes to something that I found as interesting as I did shocking: Lots of people don’t understand information security — and what’s more, they don’t protect their personal data.</description>
	<link>https://www.akamai.com/blog/culture/why-im-proud-to-protect-billions-of-people-worldwide</link>
	<author>Jessie Park</author>
	<guid>https://www.akamai.com/blog/culture/why-im-proud-to-protect-billions-of-people-worldwide</guid>
	<pubDate>Wed, 22 Dec 2021 10:00:51 UTC</pubDate>

</item>
<item>
	<title>Quantifying Log4Shell: Vulnerability on a Massive Scale</title>
	<description>The Log4Shell vulnerability is here to stay. There is a lot of speculation about the scope and true impact of the vulnerability: While many have labeled it “severe,” information is limited on how widespread the risk is. In order to shed some light on the issue, Akamai Threat Labs is utilizing its visibility into numerous data centers worldwide to assess the actual risk Log4Shell poses to organizations.</description>
	<link>https://www.akamai.com/blog/security/quantifying-log4shell-vulnerability-on-a-massive-scale</link>
	<author>Akamai Security Intelligence Group</author>
	<guid>https://www.akamai.com/blog/security/quantifying-log4shell-vulnerability-on-a-massive-scale</guid>
	<pubDate>Tue, 21 Dec 2021 20:30:35 UTC</pubDate>

</item>
<item>
	<title>How to Get Started With Application Security</title>
	<description>With a comprehensive security stack, Akamai’s application security solutions defend your entire ecosystem from threats. But before you can reap the benefits that come with application security, you need to create a configuration with Akamai’s APIs. Our Developer Advocacy team is here to walk you through the process so you can achieve Infrastructure as Code — or, as we like to call it here, Akamai as Code.  Akamai as Code has the ability to support all the DevSecOps practices you know and love, such as automating repetitive tasks and streamlining configurations and workflows, along with reducing manual work and errors.
</description>
	<link>https://www.akamai.com/blog/developers/how-to-get-started-with-application-security</link>
	<author>Mike Elissen</author>
	<guid>https://www.akamai.com/blog/developers/how-to-get-started-with-application-security</guid>
	<pubDate>Tue, 21 Dec 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Reports Another DoS in Log4j2 (CVE-2021-45105): What You Need to Know</title>
	<description>The series of vulnerabilities recently discovered in Log4j2 has shocked the internet. As part of our continuing research, on December 17, Hideki Okamoto from Akamai found and responsibly reported an additional denial-of-service (DoS) vulnerability, which was assigned as CVE-2021-45105.</description>
	<link>https://www.akamai.com/blog/security/akamai-reports-another-dos-inlog4j2</link>
	<author>Akamai Threat Research Team</author>
	<guid>https://www.akamai.com/blog/security/akamai-reports-another-dos-inlog4j2</guid>
	<pubDate>Mon, 20 Dec 2021 18:30:57 UTC</pubDate>

</item>
<item>
	<title>Threat Intelligence on Log4j CVE: Key Findings and Their Implications</title>
	<description>Continuing with our research into CVE-2021-44228, Akamai has previously written about what the vulnerability is and given recommendations on how to go beyond patching for extra protection. Across the Akamai network, we see traffic from 1.3 billion unique devices daily, with record traffic of 182 Tbps. The threat research team has been investigating this traffic to gain deeper insights into how this vulnerability is being exploited. We want to share more technical findings and what they mean for threat hunters. Here are some implications for defenders and threat hunters to consider</description>
	<link>https://www.akamai.com/blog/security/threat-intelligence-on-log4j-cve-key-findings-and-their-implications</link>
	<author>Application Security Threat Research Team</author>
	<guid>https://www.akamai.com/blog/security/threat-intelligence-on-log4j-cve-key-findings-and-their-implications</guid>
	<pubDate>Fri, 17 Dec 2021 19:30:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Recommendations for Log4j Mitigation</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/akamai-recommendations-for-log4j-mitigation</link>
	<author>Aparna Rayasam, SVP &amp; GM Application Security, Akamai</author>
	<guid>https://www.akamai.com/blog/security/akamai-recommendations-for-log4j-mitigation</guid>
	<pubDate>Thu, 16 Dec 2021 10:30:00 UTC</pubDate>

</item>
<item>
	<title>Livery Delivers a Seamless Low Latency Streaming Experience with Help from Akamai</title>
	<description>Our new normal has ushered in the advent of hybrid events — a mix of in-person and virtual events. This has made seamless live streaming with active participation of the audience, both live and remote, more important than ever. Amsterdam-headquartered company Livery is an end-to-end SaaS solution running on the Akamai content distribution network (CDN), which is perfectly suited for interactive sports, interactive learning, and live commerce productions. We’re delighted that they have chosen to work with us to deliver the experience their clients have come to love.</description>
	<link>https://www.akamai.com/blog/performance/livery-delivers-a-seamless-low-latency-streaming-experience-with-help-from-akamai</link>
	<author>Ina Christova</author>
	<guid>https://www.akamai.com/blog/performance/livery-delivers-a-seamless-low-latency-streaming-experience-with-help-from-akamai</guid>
	<pubDate>Wed, 15 Dec 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Magecart Skimmers Are Alive and Well – Constant Vigilance Is Required</title>
	<description>Magecart skimmers are here to stay, and they’re becoming more sophisticated, more creative, and harder to detect. In this post, we reveal a new skimmer infrastructure that targets ecommerce sites all over the world with advanced methods of detection evasion and obfuscation.</description>
	<link>https://www.akamai.com/blog/security/magecart-skimmers-are-alive-and-well-constant-vigilance-is-required</link>
	<author>Roman Lvovsky</author>
	<guid>https://www.akamai.com/blog/security/magecart-skimmers-are-alive-and-well-constant-vigilance-is-required</guid>
	<pubDate>Tue, 14 Dec 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>CVE-2021-44228 - Patching is Recommended for Evolving Zero Day Vulnerability in Apache Log4j that allows remote code execution (RCE)</title>
	<description>Akamai has been monitoring the rapidly evolving developments of CVE-2021-44228.  We have been working closely with our customers and internal application teams to mitigate the risks posed by the threat of unauthorized remote code execution.  This includes deploying an update to our existing Apache WAF rules to include mitigation for this Zero Day CVE, and updating the Log4j library to version 2.15.0 or later.</description>
	<link>https://www.akamai.com/blog/news/cve-2021-44228-patching-is-recommended</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/news/cve-2021-44228-patching-is-recommended</guid>
	<pubDate>Sat, 11 Dec 2021 11:00:53 UTC</pubDate>

</item>
<item>
	<title>CVE-2021-44228 - Zero Day Vulnerability in Apache Log4j that allows remote code execution (RCE)</title>
	<description>See how Akamai helped open-source logging library Log4j fight against a critical unauthenticated remote code execution (RCE) vulnerability and reduce customer exposure.</description>
	<link>https://www.akamai.com/blog/news/cve-2021-44228-zero-day-vulnerability</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/news/cve-2021-44228-zero-day-vulnerability</guid>
	<pubDate>Fri, 10 Dec 2021 21:00:00 UTC</pubDate>

</item>
<item>
	<title>Announcing Property Manager Extensions for the Integrated Development Environment </title>
	<description>We’re proud to announce the 1.0 release of the Property Manager extension to  Visual Studio Code and Eclipse. With the new Property Manager extension, you can edit and validate Property Manager API (PAPI) JSON rule trees right from your integrated development environment (IDE).  It allows you to make and validate critical changes to your configuration closer to your DevOps environment. Once you've updated and validated the configuration file in your IDE, you can easily push it back to the platform with PAPI or Akamai command-line interface (CLI).</description>
	<link>https://www.akamai.com/blog/news/announcing-property-manager-extensions-for-the-ide</link>
	<author>Iga Koprowska</author>
	<guid>https://www.akamai.com/blog/news/announcing-property-manager-extensions-for-the-ide</guid>
	<pubDate>Fri, 10 Dec 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Security's Role in Internet Resilience</title>
	<description>One aspect of resilience on the internet is that things — notably servers and resources — move around. Sometimes moves are legitimate, such as when a popular site evolves from hosting their own website to moving to a cloud provider to using a CDN to handle the ever-increasing traffic. Sometimes the moves are not legitimate, such as when an attacker pretends to be an ecommerce or banking site and steals a user’s credentials upon login. How can the end user tell the difference between legitimate and not-so-legitimate moves?</description>
	<link>https://www.akamai.com/blog/security/securitys-role-in-internet-resilience</link>
	<author> Rich Salz</author>
	<guid>https://www.akamai.com/blog/security/securitys-role-in-internet-resilience</guid>
	<pubDate>Thu, 09 Dec 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Wedia, Digital Asset Management Software Provider, Delivers Seamless Digital Experiences with Help from Akamai</title>
	<description>Wedia makes it possible for some of the world’s biggest companies to effectively manage, customize, and deliver their marketing assets. Akamai is delighted that this fantastic brand has chosen us to deliver a rich and engaging web experience for its customers while also ensuring the highest level of security for the great array of multimedia assets stored on their platform by a number of Fortune 500 companies.</description>
	<link>https://www.akamai.com/blog/performance/wedia-delivers-seamless-digital-asset-management-with-help-from-akamai</link>
	<author>Ina Christova</author>
	<guid>https://www.akamai.com/blog/performance/wedia-delivers-seamless-digital-asset-management-with-help-from-akamai</guid>
	<pubDate>Wed, 08 Dec 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>2021 SOTI Security: Year End Review</title>
	<description>What a year 2021 has been. Even as the world continues to re-open to various degrees, we’re still feeling the impact from 2020’s move to an almost completely virtual world. Many large companies are shifting to a hybrid model, mixing the ability to work from home with working in the office. Some are even offering their employees the opportunity to work remotely indefinitely. There is no denying that the way we work, bank, play, and relax has been impacted by COVID-19. Shouting “pivot” may have shot into popular culture in the TV show Friends, but it’s a rallying cry that’s been revived in the 2020s by businesses, individuals, and criminals alike. </description>
	<link>https://www.akamai.com/blog/security/soti-security-year-end-review</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/security/soti-security-year-end-review</guid>
	<pubDate>Wed, 08 Dec 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Cyber Monday Web Traffic Up Over 2020</title>
	<description>Online retail traffic that Akamai delivered during Cyber Monday was up 5% globally compared to Cyber Monday 2020 and 31% compared to average Monday traffic.</description>
	<link>https://www.akamai.com/blog/trends/cyber-monday-web-traffic-up-over-2020</link>
	<author>Chris Nicholson</author>
	<guid>https://www.akamai.com/blog/trends/cyber-monday-web-traffic-up-over-2020</guid>
	<pubDate>Wed, 01 Dec 2021 21:05:00 UTC</pubDate>

</item>
<item>
	<title>ID&amp;E: Akamai’s Journey of Continuous Improvement</title>
	<description>Akamai was founded to give the brightest minds somewhere to grow – and by surrounding ourselves with supportive individuals and an open culture, we can all bring our best, every day. It’s for this reason that our commitment to inclusion, diversity, and engagement is a key cornerstone of how we operate. Not as an objective or goal to be achieved, but as a journey of continuous learning and improvement that we can all benefit from, individually and collectively.</description>
	<link>https://www.akamai.com/blog/culture/id-and-e-akamais-journey-of-continuous-improvement</link>
	<author>Bill Bangs</author>
	<guid>https://www.akamai.com/blog/culture/id-and-e-akamais-journey-of-continuous-improvement</guid>
	<pubDate>Mon, 29 Nov 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Black Friday Web Traffic Up Over 2020</title>
	<description>Online retail traffic that Akamai delivered during Black Friday was up 2% globally compared to Black Friday 2020 and 14% compared to average Friday retail traffic. The modest year-over-year increase can be attributed to the significant rise in 2020 traffic due to COVID-19–related lockdowns and restrictions that kept many shoppers out of physical stores. </description>
	<link>https://www.akamai.com/blog/trends/black-friday</link>
	<author>Chris Nicholson</author>
	<guid>https://www.akamai.com/blog/trends/black-friday</guid>
	<pubDate>Mon, 29 Nov 2021 09:00:00 UTC</pubDate>

</item>
<item>
	<title>DataStream: Real-time Log Delivery for All Akamai Customers</title>
	<description>We are pleased to announce that DataStream 2 is now available for all our customers. DataStream 2 provides customers with detailed log data from requests on the Akamai Intelligent Edge Platform within minutes. DataStream 2 gives customers unparalleled visibility into events at the Akamai edge and puts developers first by empowering them with the data needed to support critical operations.</description>
	<link>https://www.akamai.com/blog/news/datastream-real-time-log-delivery-for-all-akamai-customers</link>
	<author>Trevor Blackford</author>
	<guid>https://www.akamai.com/blog/news/datastream-real-time-log-delivery-for-all-akamai-customers</guid>
	<pubDate>Tue, 23 Nov 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Placing Accessibility at Akamai – In Reach</title>
	<description>Encouraging and supporting open discussions about disability and mental health at work. We define disability as a condition that affects everyday activities — physically, cognitively, and/or neurologically. In Reach helps the Akamai community understand what disability means in the workplace. As a team, we also ensure disabled colleagues have the support they need to thrive – so that success is always "in reach." </description>
	<link>https://www.akamai.com/blog/culture/placing-accessibility-at-akamai-in-reach</link>
	<author>molly-elise-young-group</author>
	<guid>https://www.akamai.com/blog/culture/placing-accessibility-at-akamai-in-reach</guid>
	<pubDate>Fri, 19 Nov 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Getting Ready for Some Holiday Shopping? So Are the Bots</title>
	<description></description>
	<link>https://www.akamai.com/blog/news/getting-ready-for-some-holiday-shopping-so-are-the-bots</link>
	<author>Susan McReynolds</author>
	<guid>https://www.akamai.com/blog/news/getting-ready-for-some-holiday-shopping-so-are-the-bots</guid>
	<pubDate>Fri, 19 Nov 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Retail Data Needs Better Security in a Contextual World</title>
	<description>Do you remember the first time you made an online purchase? Me neither. I’ve made so many online purchases over the years, and I’ve probably made more in the past 18 months than in the past 5 years combined.</description>
	<link>https://www.akamai.com/blog/trends/retail-data-needs-better-security-in-a-contextual-world</link>
	<author>Gerhard Giese</author>
	<guid>https://www.akamai.com/blog/trends/retail-data-needs-better-security-in-a-contextual-world</guid>
	<pubDate>Thu, 18 Nov 2021 20:00:00 UTC</pubDate>

</item>
<item>
	<title>Healthcare Modernization? More Like Building the Plane While Flying It </title>
	<description>Anyone running a business is likely familiar with the phrase “building the plane as you’re flying it.” And through the craziness of the past 19 months, many of us lived the phrase, becoming pilots and engineers of our new realities overnight.</description>
	<link>https://www.akamai.com/blog/trends/healthcare-modernization-more-like-building-the-plane</link>
	<author>Bridget Meuse</author>
	<guid>https://www.akamai.com/blog/trends/healthcare-modernization-more-like-building-the-plane</guid>
	<pubDate>Thu, 18 Nov 2021 19:00:00 UTC</pubDate>

</item>
<item>
	<title>Finding My Way as an Akamai Intern</title>
	<description>It’s an exciting time to be starting a career in digital – but even more so when it’s at a company like Akamai. An organization driven by a commitment to developing talent within the industry, Akamai is an intellectually rigorous, demanding, and rewarding environment to be in at any level. But for new starters, programs like the summer internship can provide a 10- to 12-week opportunity to meet people and learn new skills – with real-world experiences, close working relationships, and access to subject matter experts.</description>
	<link>https://www.akamai.com/blog/culture/finding-my-way-as-an-akamai-intern</link>
	<author>Steven Gamatan</author>
	<guid>https://www.akamai.com/blog/culture/finding-my-way-as-an-akamai-intern</guid>
	<pubDate>Thu, 18 Nov 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Fighting Video Piracy Is Strengthened by Collaboration</title>
	<description>Here’s what I know: My personal email has been “pwned” or stolen at least 18 times. Here’s what I don’t know: if any of the times I have been unable to log in to one of my OTT subscription services was due to my kids sharing our credentials or because of an account takeover — that kill chain that starts with harvesting stolen username/password combinations and then testing them via a credential stuffing attack. </description>
	<link>https://www.akamai.com/blog/trends/fighting-video-piracy-is-strengthened-by-collaboration</link>
	<author>Shane Keats </author>
	<guid>https://www.akamai.com/blog/trends/fighting-video-piracy-is-strengthened-by-collaboration</guid>
	<pubDate>Thu, 18 Nov 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>RTL Nederland Makes Weather Forecasting Fast, Reliable and Sustainable with Help From Akamai</title>
	<description>Media giant RTL Nederland offers a weather app that gives users the ability to get a comprehensive overview of the weather in their location at the click of a button. Akamai is delighted that this exciting media brand has chosen us to deliver a rich and engaging web experience for its viewers while providing a sustainable infrastructure via our Akamai Intelligent Edge Platform.</description>
	<link>https://www.akamai.com/blog/news/rtl-nederland-makes-weather-forecasting-fast-reliable-sustainable-with-help-from-akamai</link>
	<author>Ina Christova</author>
	<guid>https://www.akamai.com/blog/news/rtl-nederland-makes-weather-forecasting-fast-reliable-sustainable-with-help-from-akamai</guid>
	<pubDate>Wed, 17 Nov 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Digging Deeper – An In-Depth Analysis of a Fast Flux Network</title>
	<description>Fast Flux is a DNS technique used by botnets to hide various types of malicious activities, such as phishing, web proxying, malware delivery, and malware communication, behind an ever-changing network of compromised hosts acting as proxies. The Fast Flux network concept was first introduced in 2006, with the emergence of Storm Worm malware variants. The Fast Flux network is typically used to make the communication between malware and its command and control (C2) server more resistant to discovery. Akamai’s research team has analyzed sophisticated botnet infrastructure that leverages Fast Flux techniques including domains, nameservers, and IP address changes. Figure 1 shows an overview of such a network, which can also be referred to as a form of bulletproof hosting, that hosts various malicious services. These networks empower threat actors to execute attack campaigns by utilizing network capabilities to host malware binaries, proxy communication to C2 servers, phishing websites, or proxy attacks on websites across the internet.</description>
	<link>https://www.akamai.com/blog/security/digging-deeper-an-in-depth-analysis-of-a-fast-flux-network</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/digging-deeper-an-in-depth-analysis-of-a-fast-flux-network</guid>
	<pubDate>Tue, 16 Nov 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>New Updates to Guardicore Centra Boost Zero Trust Posture and Enhance Ransomware Protection</title>
	<description>In our update to Guardicore Hunt see how you can enhance your ransomware protections as well as Zero Trust.</description>
	<link>https://www.akamai.com/blog/security/centra-update-zero-trust-posture-and-enhance-ransomware-protection</link>
	<author>Ravit Greitser</author>
	<guid>https://www.akamai.com/blog/security/centra-update-zero-trust-posture-and-enhance-ransomware-protection</guid>
	<pubDate>Mon, 15 Nov 2021 16:47:00 UTC</pubDate>

</item>
<item>
	<title>Open Finance — 5 Reasons to Consider Akamai</title>
	<description>The increased use of smart devices, improved connectivity, and today’s hyper demanding customers are driving the need for digital transformation in the finance sector. Emerging technologies like open banking are creating new opportunities for both incumbent banks and fintechs.</description>
	<link>https://www.akamai.com/blog/news/open-finance-5-reasons-to-consider-akamai</link>
	<author>Vitor Nakano</author>
	<guid>https://www.akamai.com/blog/news/open-finance-5-reasons-to-consider-akamai</guid>
	<pubDate>Mon, 15 Nov 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Developers Push Coding to the Edge in Akamai </title>
	<description>The first-ever Akamai EdgeWorkers Coding Challenge gave participants the opportunity to harness the power and potential of serverless computing using the Akamai Intelligent Edge Platform. Winning developer teams built functions using Akamai EdgeWorkers and EdgeKV products that ranged from DNS acceleration and cost-reducing traffic efficiencies to personalized experiences for news and cloud gaming. </description>
	<link>https://www.akamai.com/blog/developers/developers-push-coding-to-the-edge-in-akamai</link>
	<author>Chris Nicholson</author>
	<guid>https://www.akamai.com/blog/developers/developers-push-coding-to-the-edge-in-akamai</guid>
	<pubDate>Thu, 11 Nov 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Redefining Security at the Mobile Edge</title>
	<description>During the pandemic, organizations became more geographically dispersed, even if that only means people working from home instead of the office. As businesses begin to open up again, the trend is leaning toward mobility as a means to support a hybrid working environment, in which employees have more flexibility to work wherever it suits them best. The remote user, who was once the exception, has become the norm.</description>
	<link>https://www.akamai.com/blog/edge/redefining-security-at-the-mobile-edge</link>
	<author>Octavio Hernandez</author>
	<guid>https://www.akamai.com/blog/edge/redefining-security-at-the-mobile-edge</guid>
	<pubDate>Wed, 10 Nov 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Is Now a Cybersecurity Powerhouse</title>
	<description>Over the past five years, we’ve grown Akamai’s security portfolio from point solutions into a comprehensive platform that provides defense in depth to address our customers’ biggest threats. The unique breadth of our defenses is important to our customers who want the most effective security capabilities, and more of them from fewer vendors.  </description>
	<link>https://www.akamai.com/blog/news/akamai-is-now-a-cybersecurity-powerhouse</link>
	<author>Tom Leighton</author>
	<guid>https://www.akamai.com/blog/news/akamai-is-now-a-cybersecurity-powerhouse</guid>
	<pubDate>Tue, 09 Nov 2021 16:00:59 UTC</pubDate>

</item>
<item>
	<title>Finding Purpose in Wellness</title>
	<description>“Wellness” is something that many employers are racing to embrace. Good for both their organizations and their people, wellness is an investment in creating a happier and more engaged workforce, as well as reducing the effects of stress and burnout. It has the potential to increase productivity, foster ideas, and reconnect to a sense of purpose – for both individuals and the business. </description>
	<link>https://www.akamai.com/blog/culture/finding-purpose-in-wellness</link>
	<author>Nathalie Faint</author>
	<guid>https://www.akamai.com/blog/culture/finding-purpose-in-wellness</guid>
	<pubDate>Tue, 09 Nov 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Celebrating Hispanic Heritage Month with Ohana</title>
	<description>National Hispanic American Heritage Month (September 15 to October 15) is a time to recognize the achievements and contributions of trailblazing Hispanic Americans whose legacies have inspired the world. Akamai stands with our American colleagues whose ancestors came from Spain, Mexico, the Caribbean, and Central and South America in celebrating those achievements. And with groups like the Ohana ERG, we’re able to use this month to share insights that help make our company a better place to be.</description>
	<link>https://www.akamai.com/blog/culture/celebrating-hispanic-heritage-month-with-ohana</link>
	<author> Jo Gumbs  &amp; Yancy Carrasco</author>
	<guid>https://www.akamai.com/blog/culture/celebrating-hispanic-heritage-month-with-ohana</guid>
	<pubDate>Mon, 08 Nov 2021 14:00:57 UTC</pubDate>

</item>
<item>
	<title>Internet Resilience, Part 2: What It Takes to “Just Work”</title>
	<description>One of the greatest signs of the success of the internet as a technology is how little the average person thinks about it. I’m not talking about the content itself. The streaming videos, online shopping sites, news and educational content, workplace productivity tools, and many other pieces of content we view and interact with online garner a great deal of attention. I’m instead talking about what’s involved in getting that content delivered reliably, quickly, and securely to a device.</description>
	<link>https://www.akamai.com/blog/performance/internet-resilience-part2-what-it-takes-to-just-work</link>
	<author>James Kretchmar</author>
	<guid>https://www.akamai.com/blog/performance/internet-resilience-part2-what-it-takes-to-just-work</guid>
	<pubDate>Mon, 08 Nov 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai App &amp; API Protector: Maximize Security Through Simplicity</title>
	<description>Building incredible digital experiences often involves leveraging serverless edge computing, microservices-based architectures, IaaS environments, client-side functionality, and APIs. These modern development practices, while designed to produce highly personalized, fast, and always-on user experiences, also inextricably introduce new vulnerabilities and risks.</description>
	<link>https://www.akamai.com/blog/news/akamai-app-and-api-protector-maximize-security-through-simplicity</link>
	<author>Charles Choe</author>
	<guid>https://www.akamai.com/blog/news/akamai-app-and-api-protector-maximize-security-through-simplicity</guid>
	<pubDate>Mon, 08 Nov 2021 11:30:00 UTC</pubDate>

</item>
<item>
	<title>Keeping Up with Biden Administration Cybersecurity Mandates</title>
	<description>With Wednesday’s sweeping cybersecurity mandates issued by the Biden administration, patching Common Vulnerabilities and Exposures (CVEs) are top of mind — for both federal and private-sector companies alike — to help prevent damaging intrusions. Intensifying the pressure surrounding the latest round of mandates, federal agencies are required to address high-risk vulnerabilities discovered in 2021 within two weeks. However, for the vast majority of organizations and their security teams, addressing every critical vulnerability at the software or infrastructure level quickly is not feasible. Instead, many enterprise defenders look to virtual patching via solutions like WAF policy updates and rule changes as a quick fix to help reduce immediate risk, while longer-term software updates are issued.</description>
	<link>https://www.akamai.com/blog/news/akamai-stays-one-step-ahead-of-biden-cve-mandates</link>
	<author>Amol Mathur</author>
	<guid>https://www.akamai.com/blog/news/akamai-stays-one-step-ahead-of-biden-cve-mandates</guid>
	<pubDate>Fri, 05 Nov 2021 16:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai + Guardicore: End-to-End Zero Trust</title>
	<description>Ransomware attacks increased by over 150% in 2020. As criminals find new ways to attack networks and systems, protect work-from-home employees with Akamai.</description>
	<link>https://www.akamai.com/blog/news/akamai-guardicore-end-to-end-zero-trust</link>
	<author>Robert Blumofe &amp; Ariel Zeitlin</author>
	<guid>https://www.akamai.com/blog/news/akamai-guardicore-end-to-end-zero-trust</guid>
	<pubDate>Wed, 03 Nov 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Holiday Readiness, Part Four: What You Should Be Thinking About One Month Out — Monitoring and Alerting</title>
	<description>
November is here. Now it’s crunch time. Hopefully, implementing the solutions in parts one through three of this series has kept you busy over the last few months. In those articles, we covered security, flash crowd management, disaster recovery, and performance optimization checklists. If you are not in a code freeze yet, work with your Akamai account team to review the content to determine what features you still have time to enable.</description>
	<link>https://www.akamai.com/blog/trends/holiday-readiness-part-four-what-you-should-be-thinking-about-one-month-out-monitoring-and-alerting</link>
	<author>Michael Hansen</author>
	<guid>https://www.akamai.com/blog/trends/holiday-readiness-part-four-what-you-should-be-thinking-about-one-month-out-monitoring-and-alerting</guid>
	<pubDate>Mon, 01 Nov 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Strategy for the Office Anywhere</title>
	<description>Organizations must deploy a remote working strategy that suits the office anywhere model CIOs need to demonstrate leadership as we move out of lockdown into a new model of working in which the office is wherever the employee is. It’s time to build on this initial success and embed a remote working strategy within organizations.</description>
	<link>https://www.akamai.com/blog/security/strategy-for-the-office-anywhere</link>
	<author>Octavio Hernandez</author>
	<guid>https://www.akamai.com/blog/security/strategy-for-the-office-anywhere</guid>
	<pubDate>Mon, 01 Nov 2021 12:55:00 UTC</pubDate>

</item>
<item>
	<title>Securing the Enterprise Network for the Office Anywhere</title>
	<description>During the pandemic, it was reassuring to see businesses demonstrating resilience and enabling remote working for their employees — in some cases, practically overnight. As businesses slowly reopen their doors, it is clear that many things have changed, key amongst them the increasing risks to the enterprise network as more work is carried out from mobile devices.</description>
	<link>https://www.akamai.com/blog/security/securing-the-enterprise-network-for-the-office-anywhere</link>
	<author>Octavio Hernandez</author>
	<guid>https://www.akamai.com/blog/security/securing-the-enterprise-network-for-the-office-anywhere</guid>
	<pubDate>Wed, 27 Oct 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Your Best Defense Against Ransomware: Akamai + Guardicore</title>
	<description>For decades, Akamai has been focused on solving tough problems for our customers. We started by addressing the challenges of the “World Wide Wait,” and quickly started to leverage our edge network’s scale, proximity to users, and expert operations staff to mitigate security threats for our customers. Today, Akamai has category-leading solutions including DDoS, web app and API protection, bot management, and Zero Trust Network Access. Given the incredible surge in ransomware attacks, we are excited to be adding Zero Trust segmentation to our portfolio through the acquisition of Guardicore.</description>
	<link>https://www.akamai.com/blog/news/your-best-defense-against-ransomware-akamai-and-guardicore</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/news/your-best-defense-against-ransomware-akamai-and-guardicore</guid>
	<pubDate>Thu, 21 Oct 2021 15:30:37 UTC</pubDate>

</item>
<item>
	<title>Over 25% of Malicious JavaScript Is Being Obfuscated</title>
	<description>Last year, Akamai released research on obfuscation techniques being used by cybercriminals to create malicious JavaScript. The code is unreadable, un-debuggable, and as a result, much more challenging to analyze and detect.</description>
	<link>https://www.akamai.com/blog/security/over-25-percent-of-malicious-javascript-is-being-obfuscated</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/over-25-percent-of-malicious-javascript-is-being-obfuscated</guid>
	<pubDate>Tue, 19 Oct 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What Microsoft Bing’s IndexNow Means for CDN Users</title>
	<description>Microsoft Bing today announced the rollout of IndexNow, a new protocol designed in conjunction with Yandex that can allow “websites to easily notify search engines whenever their website content is created, updated, or deleted.” The goal is to reduce the amount of time it takes for search engines to discover and index website changes — a process often measured in days and even weeks — to mitigate traffic loss and the potential adverse effects on customers and even revenues. </description>
	<link>https://www.akamai.com/blog/news/what-microsoft-bings-indexnow-means-for-cdn-users</link>
	<author>Jon Alexander</author>
	<guid>https://www.akamai.com/blog/news/what-microsoft-bings-indexnow-means-for-cdn-users</guid>
	<pubDate>Mon, 18 Oct 2021 10:00:00 UTC</pubDate>

</item>
<item>
	<title>Integrating Akamai mPulse with Consent Management Providers</title>
	<description>Akamai mPulse is a real user monitoring solution, providing detailed information about the user experiences delivered by your web applications. mPulse can be configured within your Akamai property to automatically start collecting data from your customer visits. This initial setup will gather the data required to use advanced features in Adaptive Acceleration such as Script Manager, Automatic Server Push, and Automatic Preconnect.</description>
	<link>https://www.akamai.com/blog/performance/integrating-akamai-mpulse-with-consent-management-providers</link>
	<author>Simon Hearne</author>
	<guid>https://www.akamai.com/blog/performance/integrating-akamai-mpulse-with-consent-management-providers</guid>
	<pubDate>Thu, 14 Oct 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai MFA in Action: Single Sign-On is Phish-Proof and Simple to Use </title>
	<description>Breaking news: we just completed an 850-user pilot with Akamai MFA. In this blog, the first in a series, I’ll explain why we switched to Akamai MFA, how we ran our pilot, and employee feedback so far. Check back for my next blog, when we’re midway through our global deployment.

A burglar checks for open windows. Neglecting to lock just one is like leaving the door wide open. In the same way, cyber attackers look for the easiest user accounts to take over — whether that’s network access credentials, email, on-premise applications, or cloud/SaaS applications. If they’re lucky, they can also use the stolen credentials to breach other systems, an action known as lateral movement.</description>
	<link>https://www.akamai.com/blog/security/akamai-mfa-in-action-single-sign-on-is-phish-proof-and-simple-to-use</link>
	<author>Keith Tomlinson</author>
	<guid>https://www.akamai.com/blog/security/akamai-mfa-in-action-single-sign-on-is-phish-proof-and-simple-to-use</guid>
	<pubDate>Wed, 13 Oct 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Mitigating CVE-2021-41773: Apache HTTP Server Path Traversal</title>
	<description>On September 29, Ash Daulton, along with the cPanel Security Team, reported a path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.29 to the Apache security team. The issue was fixed within two days, under CVE-2021-41773, and the patch was released on October 4. Apache urged to deploy the fix, as it is already being actively exploited. </description>
	<link>https://www.akamai.com/blog/news/how-akamai-helps-you-protect-against-0-days</link>
	<author>Assaf Vilmovsky  &amp; Maxim Zavodchik</author>
	<guid>https://www.akamai.com/blog/news/how-akamai-helps-you-protect-against-0-days</guid>
	<pubDate>Thu, 07 Oct 2021 20:15:00 UTC</pubDate>

</item>
<item>
	<title>Coming Together to Tackle Phishing — For the Greater Good</title>
	<description>Every day, Akamai’s Threat Research team tracks and mitigates phishing attack campaigns to help keep our customers — and their reputations — protected. Recently, they tracked an orchestrated attack campaign comprising more than 9,000 domains and subdomains, mainly targeting victims located in China. The phishing scam was abusing more than 15 high-profile and trusted brands spanning ecommerce, travel, and food &amp; beverage industries. By using well-known brand names, the threat actors attempted to engage victims to participate in a quiz that, once completed, would result in winning an attractive prize. Akamai refers to this malicious modus operandi as a “question quiz” phishing attack campaign.</description>
	<link>https://www.akamai.com/blog/security/coming-together-to-tackle-phishing-for-the-greater-good</link>
	<author>Akamai Threat Research Team</author>
	<guid>https://www.akamai.com/blog/security/coming-together-to-tackle-phishing-for-the-greater-good</guid>
	<pubDate>Thu, 07 Oct 2021 13:20:00 UTC</pubDate>

</item>
<item>
	<title>Attack Campaigns Ramp Up for Organizations Down Under</title>
	<description>DDoS and AppSec attacks impacting the ANZ region (Australia and New Zealand) have been in the headlines of late, with several high profile companies seeing prolonged outages and leading to speculation as to whether the region is being specifically targeted? Let’s take a closer look at the types of attack vectors and malicious activity we’ve seen focused on customers down under.
</description>
	<link>https://www.akamai.com/blog/security/attack-campaigns-ramp-up-for-organizations-down-under</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/attack-campaigns-ramp-up-for-organizations-down-under</guid>
	<pubDate>Thu, 07 Oct 2021 13:15:00 UTC</pubDate>

</item>
<item>
	<title>Making the Internet Resilient: Part One</title>
	<description>Think how many websites you visit or videos you stream. Do you check your bank account or transfer money, download apps, play music, share updates on social media, or use the internet for any of the thousands of other digital experiences it enables every day?</description>
	<link>https://www.akamai.com/blog/performance/making-the-internet-resilient-part-one</link>
	<author>Adam Karon</author>
	<guid>https://www.akamai.com/blog/performance/making-the-internet-resilient-part-one</guid>
	<pubDate>Thu, 07 Oct 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Impact of Third-Party Scripts on the Facebook Outage</title>
	<description>A lot has already been written about the Facebook outage earlier this week. In case you missed it (if that’s possible), Facebook, Facebook Messenger, Instagram, and WhatsApp were all down for several hours on Monday. Facebook provided an update on the cause of the outage late Monday, citing a configuration change on their backbone routers as the root cause, with additional details in a subsequent blog post. </description>
	<link>https://www.akamai.com/blog/news/the-impact-of-third-party-scripts-on-the-facebook-outage</link>
	<author>Kunjal Botadra</author>
	<guid>https://www.akamai.com/blog/news/the-impact-of-third-party-scripts-on-the-facebook-outage</guid>
	<pubDate>Wed, 06 Oct 2021 15:00:14 UTC</pubDate>

</item>
<item>
	<title>Forrester: Embrace Zero Trust for Australia’s Essential Eight</title>
	<description>Understand why it's important to refine your organization’s approach. See how to enact a security model that protects your business and enables growth.</description>
	<link>https://www.akamai.com/blog/news/forrester-embrace-zero-trust-for-australias-essential-eight</link>
	<author>Johnny Yeo</author>
	<guid>https://www.akamai.com/blog/news/forrester-embrace-zero-trust-for-australias-essential-eight</guid>
	<pubDate>Wed, 06 Oct 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Power of Why: Rediscovering Akamai’s Purpose</title>
	<description>As I took on the role of Chief Marketing Officer of Akamai earlier this year, I set out to inspire and challenge our teams to build an impactful global campaign that showcases not just what we do, but what we make possible. What quickly became clear is that to be authentic in talking about what we make possible, we first needed to get crystal clear on our why — WHY our company exists, and what our greater impact on the world is.</description>
	<link>https://www.akamai.com/blog/news/the-power-of-why-rediscovering-akamais-purpose</link>
	<author>Kim Salem-Jackson</author>
	<guid>https://www.akamai.com/blog/news/the-power-of-why-rediscovering-akamais-purpose</guid>
	<pubDate>Tue, 05 Oct 2021 16:00:26 UTC</pubDate>

</item>
<item>
	<title>Holiday Readiness, Part Three: What you Should be Thinking About Two Months Out—Performance Optimizations</title>
	<description>October is here, and that means we are less than two months away from the busiest weekend of the year. Parts one and two of the Holiday Readiness blog series covered topics ranging from security checklists to disaster recovery strategies and flash crowd management. If you haven’t had a chance to review those topics and checklists, now is a critical time to start to ensure you are ready for the traffic rush the holiday season brings. </description>
	<link>https://www.akamai.com/blog/trends/holiday-preparedness-things-to-think-about-2-months-out-performance-configurations</link>
	<author>Michael Hansen</author>
	<guid>https://www.akamai.com/blog/trends/holiday-preparedness-things-to-think-about-2-months-out-performance-configurations</guid>
	<pubDate>Mon, 04 Oct 2021 22:02:00 UTC</pubDate>

</item>
<item>
	<title>EAA Client Escalation of Privilege Vulnerability on Windows</title>
	<description>This post covers the details of CVE-2021-40683 (CVSS 6.5), the vulnerability impacting the Akamai Enterprise Application Access (EAA) Client running on Windows systems, for which Akamai has provided a patch to its customers. </description>
	<link>https://www.akamai.com/blog/news/eaa-client-escalation-of-privilege-vulnerability</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/news/eaa-client-escalation-of-privilege-vulnerability</guid>
	<pubDate>Mon, 04 Oct 2021 20:13:00 UTC</pubDate>

</item>
<item>
	<title>Attacking a Macro Security Problem with Micro-segmentation</title>
	<description>Ransomware is everywhere. And the shift of workloads to the cloud and employees to work-from-home models has only expanded the attack surface, creating new opportunities for attackers to leverage. Companies need Zero Trust solutions that not only defend against threat actors gaining access to enterprise systems, but also mitigate the impact of infections that slip through the cracks.  </description>
	<link>https://www.akamai.com/blog/security/attacking-a-macro-security-problem-with-micro-segmentation</link>
	<author>Charlie Gero</author>
	<guid>https://www.akamai.com/blog/security/attacking-a-macro-security-problem-with-micro-segmentation</guid>
	<pubDate>Wed, 29 Sep 2021 10:04:00 UTC</pubDate>

</item>
<item>
	<title>Monitoring Our Hay Storage with Edge Connect and Machine Learning</title>
	<description>What do hay storage, Akamai’s Edge Connect solution, and machine learning have in common? We use the serverless machine learning system to keep our hay storage safe and secure.</description>
	<link>https://www.akamai.com/blog/edge/monitoring-our-hay-storage-with-edge-connect-and-machine-learnin</link>
	<author>Brian Apley</author>
	<guid>https://www.akamai.com/blog/edge/monitoring-our-hay-storage-with-edge-connect-and-machine-learnin</guid>
	<pubDate>Thu, 23 Sep 2021 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Named a Gartner Magic Quadrant Leader for Web Application and API Protection</title>
	<description>This week, Gartner released its new 2021 Magic Quadrant for Web Application and API Protection (WAAP) report, which replaces the Magic Quadrant for Web Application Firewalls (WAF) report, and Akamai has been named a Leader. Akamai was named a Leader in the four previous WAF Magic Quadrants.</description>
	<link>https://www.akamai.com/blog/news/akamai-named-a-gartner-magic-quadrant-leader-for-web-application-and-api-protection</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/news/akamai-named-a-gartner-magic-quadrant-leader-for-web-application-and-api-protection</guid>
	<pubDate>Wed, 22 Sep 2021 18:00:00 UTC</pubDate>

</item>
<item>
	<title>Autodiscovering the Great Leak</title>
	<description>See the most recent research from Amit Serper on a vulnerability in Autodiscover from Microsoft Outlook that affects credential leaks.</description>
	<link>https://www.akamai.com/blog/security/autodiscovering-the-great-leak</link>
	<author>Amit Serper</author>
	<guid>https://www.akamai.com/blog/security/autodiscovering-the-great-leak</guid>
	<pubDate>Wed, 22 Sep 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What Is a TCP Three-Way Handshake?</title>
	<description>The TCP three-way handshake is one of the critical building blocks of the internet. It facilitates the smooth and consistent flow of information across and among different networks without compromising security.</description>
	<link>https://www.akamai.com/blog/security/tcp-three-way-handshake</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/security/tcp-three-way-handshake</guid>
	<pubDate>Tue, 21 Sep 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>DDoS Chart Toppers—BPS, PPS and RPS Greatest Hits</title>
	<description>New to the scene, monster-sized botnet Mēris is raising some eyebrows with giant requests per second (rps) attacks as shared by Cloudflare (17.2M rps, reported August 19), Yandex (peaking at 21.8M rps on September 5), and KrebsOnSecurity (2M rps on September 9). Some commentary came in on Slashdot, The Record, and The Hacker News.</description>
	<link>https://www.akamai.com/blog/security/ddos-chart-toppers-bps-pps-and-rps-greatest-hits</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/ddos-chart-toppers-bps-pps-and-rps-greatest-hits</guid>
	<pubDate>Fri, 17 Sep 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Learn How Akamai Enables AI Powered Analytics Tools to Reduce Water Losses</title>
	<description>The Accelerator Program, a flagship initiative of Akamai India’s Corporate Social Responsibility Trust, enables early-stage innovations for water conservation. Over the past two years, along with our mentoring partner, the International Center for Clean Water (ICCW; an initiative of the Indian Institute of Technology Madras), we onboarded two social innovators as Cohort 1 grantees: Ashoka Trust for Research in Ecology and the Environment  and Foundation for Environmental Monitoring, and two  social innovators as Cohort 2 grantees, SmartTerra and Jaljeevika. </description>
	<link>https://www.akamai.com/blog/culture/learn-how-akamai-enables-ai-powered-analytics-tools-to-reduce-wa</link>
	<author>Sushma Shashidhara</author>
	<guid>https://www.akamai.com/blog/culture/learn-how-akamai-enables-ai-powered-analytics-tools-to-reduce-wa</guid>
	<pubDate>Fri, 17 Sep 2021 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Capoae Malware Ramps Up: Uses Multiple Vulnerabilities and Tactics to Spread</title>
	<description>Recently, there has been a plethora of UPX packed crypto-mining malware written in Golang targeting Linux systems and web applications popping up in the news. The malware’s primary tactic is to spread by taking advantage of vulnerable systems and weak administrative credentials. Once they’ve been infected, these systems are then used to mine cryptocurrency.  I’ve named the sample I examined for this post ‘Capoae,’ based on the code’s output to my terminal. </description>
	<link>https://www.akamai.com/blog/security/capoae-malware-ramps-up-uses-multiple-vulnerabilities-and-tactics-to-spread</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/capoae-malware-ramps-up-uses-multiple-vulnerabilities-and-tactics-to-spread</guid>
	<pubDate>Thu, 16 Sep 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Kinsing evolves, adds Windows to attack list</title>
	<description>The campaign was first seen by the Akamai SIRT on February 16, 2021, and appears to be targeting both Windows and Linux systems. The botnet caught our interest because it has shown to be highly active across a diverse set of geographical regions, including the Americas, Europe, and Asia. </description>
	<link>https://www.akamai.com/blog/security/kinsing-evolves-adds-windows-to-attack-list</link>
	<author>Evyatar Saias</author>
	<guid>https://www.akamai.com/blog/security/kinsing-evolves-adds-windows-to-attack-list</guid>
	<pubDate>Thu, 16 Sep 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai’s Flagship Customer Enablement Program, Akamai University, Wins Gold “Excellence in Learning” Award</title>
	<description>The Technical Enablement and Education team, part of Akamai’s Global Services organization, has won a coveted Brandon Hall Group Gold award for “Best Customer Training Program,” for Akamai’s flagship customer training and enablement program, Akamai University.</description>
	<link>https://www.akamai.com/blog/news/akamai-s-flagship-customer-enablement-program--akamai-university</link>
	<author>Magdalena Frankiewicz</author>
	<guid>https://www.akamai.com/blog/news/akamai-s-flagship-customer-enablement-program--akamai-university</guid>
	<pubDate>Wed, 15 Sep 2021 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Confluence Server Webwork OGNL Injection (CVE-2021-26084): How Akamai Helps You Protect Against Zero-Day Attacks</title>
	<description>Recently Atlassian has disclosed a critical RCE (Remote Code Execution) vulnerability in its Confluence server and Data Center products (CVE-2021-26084), which might allow unauthenticated users to execute arbitrary code on vulnerable servers.</description>
	<link>https://www.akamai.com/blog/security/confluence-server-webwork-ognl-injection-cve-2021-26084</link>
	<author>Assaf Vilmovsky , Abdeslam Bella &amp; Maxim Zavodchik</author>
	<guid>https://www.akamai.com/blog/security/confluence-server-webwork-ognl-injection-cve-2021-26084</guid>
	<pubDate>Wed, 15 Sep 2021 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Now Live: On-Demand Learning and Hands-On Labs at Learn Akamai</title>
	<description>I’m excited to announce our new all-inclusive Learning Hub as the single destination for all product learning resources at Akamai. This new Hub gives users the ability to choose the method of learning that suits them best, whether that’s reading through technical documentation, exploring our on-demand elearning modules and hands-on labs, or joining a community discussion.</description>
	<link>https://www.akamai.com/blog/news/now-live--on-demand-learning-and-hands-on-labs-at-learn-akamai</link>
	<author>Bonnie Howden</author>
	<guid>https://www.akamai.com/blog/news/now-live--on-demand-learning-and-hands-on-labs-at-learn-akamai</guid>
	<pubDate>Tue, 14 Sep 2021 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Jest Mocks—Unit Testing for EdgeWorkers</title>
	<description>In case you haven’t already been working with EdgeWorkers, it allows you to run JavaScript code across more than 4,200 locations for proximity to users and fast application response times. 
With more and more application functionality moving to the edge, it’s increasingly important to ensure that each function is doing what it needs to do. A unit test runs code over each segment of your program, checking the input and output. These tests allow developers to check individual areas of a program to see where (and why) errors are occurring. Several frameworks allow you to easily run your tests, including popular frameworks like Jest, Mocha, Jasmine, and Cypress. 
</description>
	<link>https://www.akamai.com/blog/developers/jest-mocks-unit-testing-for-edgeworkers</link>
	<author>Varuna GP</author>
	<guid>https://www.akamai.com/blog/developers/jest-mocks-unit-testing-for-edgeworkers</guid>
	<pubDate>Wed, 08 Sep 2021 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Holiday Readiness, Part Two: What you Should be Thinking About Three Months Out—Capacity Planning</title>
	<description>Welcome back to the Holiday Readiness blog series. We hope part one has kept you busy over the past month as you continue to improve your security posture. If you haven’t finished all of the security checklist items, don’t worry — there is still time before Black Friday and Cyber Monday.</description>
	<link>https://www.akamai.com/blog/trends/holiday-readiness--part-two--what-you-should-be-thinking-about-t</link>
	<author>Michael Hansen</author>
	<guid>https://www.akamai.com/blog/trends/holiday-readiness--part-two--what-you-should-be-thinking-about-t</guid>
	<pubDate>Tue, 07 Sep 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Passwords — Extinction Event Looming?</title>
	<description>Passwords are the bane of users and security teams’ lives. Despite years of security teams educating users about not using 123456 as a password, not recycling passwords across multiple personal and professional accounts, and implementing even more rigorous password rules and investments in password manager tools, these combinations of letters, numbers, and special characters remain a rich target for attackers.</description>
	<link>https://www.akamai.com/blog/security/passwords---extinction-event-looming-</link>
	<author>Richard Meeus</author>
	<guid>https://www.akamai.com/blog/security/passwords---extinction-event-looming-</guid>
	<pubDate>Wed, 01 Sep 2021 07:00:00 UTC</pubDate>

</item>
<item>
	<title>UPX Packed Headaches</title>
	<description>Researching malware has many challenges.  One of those challenges is obfuscated code and intentionally corrupted binaries. To address challenges like this, we've written a small tool in C that could fix intentionally corrupted binaries automatically. We also plan to open-source the project so other researchers could use it too, and perhaps improve and expand upon the tool's capabilities as needed.</description>
	<link>https://www.akamai.com/blog/security/upx-packed-headaches</link>
	<author>Akamai SIRT</author>
	<guid>https://www.akamai.com/blog/security/upx-packed-headaches</guid>
	<pubDate>Mon, 23 Aug 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Dogged Persistence—The Name of the Game for One DDoS Attacker</title>
	<description>With DDoS, we typically observe a moderate degree of attacker persistence. DDoS attacks are relatively easy to launch from a number of online booter services, and the availability of cryptocurrencies for payment has made it easy to remain anonymous. Attackers can try their hand at DDoS for little effort and money, and in relative safety. They give it a go, try a few things (vector, endpoint, and scale changes), and for those with effective defenses, the attacker eventually burns out. </description>
	<link>https://www.akamai.com/blog/news/dogged-persistence-the-name-of-the-game-for-one-ddos-attacker</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/news/dogged-persistence-the-name-of-the-game-for-one-ddos-attacker</guid>
	<pubDate>Wed, 18 Aug 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Tokyo Streaming Traffic Runs Rings Around Rio</title>
	<description>With 35 medals at stake, the last full day of competition during the games in Tokyo generated the highest video streaming traffic for 30-plus customers on the Akamai Intelligent Edge Platform. Medal matches for baseball, basketball, and soccer, along with several track and field finals, drove related traffic to 10 Tbps on Saturday, August 7.</description>
	<link>https://www.akamai.com/blog/performance/tokyo-streaming-traffic-runs-rings-around-rio</link>
	<author>Cory Sakakeeny</author>
	<guid>https://www.akamai.com/blog/performance/tokyo-streaming-traffic-runs-rings-around-rio</guid>
	<pubDate>Mon, 16 Aug 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>HTTP/2 Request Smuggling</title>
	<description>HTTP Request Smuggling (also known as an HTTP Desync Attack) has experienced a resurgence in security research recently, thanks in large part to the outstanding work by security researcher James Kettle. His 2019 Blackhat presentation on HTTP Desync attacks exposed vulnerabilities with different implementations of the HTTP Standards, particularly within proxy servers and Content Delivery Networks (CDNs).These implementation differences with regard to how proxy servers interpret the construction of web requests have led to new request smuggling vulnerabilities. (Direct link to information on new vulnerability).</description>
	<link>https://www.akamai.com/blog/security/http-2-request-smuggling</link>
	<author>Ryan Barnett</author>
	<guid>https://www.akamai.com/blog/security/http-2-request-smuggling</guid>
	<pubDate>Thu, 05 Aug 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>hAFL1 – Our Journey of Fuzzing Hyper-V and Discovering a Critical 0-Day</title>
	<description>Within hours from the moment our in-house built fuzzer, hAFL1, started running – it found a critical, CVSS 9.9 RCE vulnerability in Hyper-V’s virtual driver.</description>
	<link>https://www.akamai.com/blog/security/discovering-a-critical-0-day</link>
	<author>Ophir Harpaz &amp; Peleg Hadar</author>
	<guid>https://www.akamai.com/blog/security/discovering-a-critical-0-day</guid>
	<pubDate>Wed, 04 Aug 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Putting Purpose First as an Akamai Co-Op</title>
	<description>As I began my CSR Co-op position this year, I wanted to see up-close how a corporate foundation works. What I've found is that the work the Akamai Foundation does around the world is inspiring! Whether it's partnering with STEM educators, responding to the COVID-19 crisis, planning employee volunteerism efforts, or creating a hardship fund to support our community, what we do here has a positive impact across the globe. And, thanks to this co-op opportunity, I've been able to play a real part in driving this impact forward.</description>
	<link>https://www.akamai.com/blog/culture/putting-purpose-first-as-akamai-co-op</link>
	<author>Caitlin Brightman</author>
	<guid>https://www.akamai.com/blog/culture/putting-purpose-first-as-akamai-co-op</guid>
	<pubDate>Mon, 02 Aug 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai's Commitment to Reliability</title>
	<description>For more than 20 years, Akamai has worked very hard to earn the trust and confidence of our customers and partners by developing services that can be relied upon to be available and secure at all times. </description>
	<link>https://www.akamai.com/blog/news/akamais-commitment-to-reliability</link>
	<author>Tom Leighton</author>
	<guid>https://www.akamai.com/blog/news/akamais-commitment-to-reliability</guid>
	<pubDate>Fri, 30 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Zero Trust Should Not Give IT a Bad Name</title>
	<description>Maybe you’ve just found out that your company’s IT organization is implementing Zero Trust. Does that mean they don’t trust you? “Zero Trust” sure sounds that way. Maybe you’ve read about it online or heard somebody talk about it in terms that equate Zero Trust with the idea that users and devices are never trusted. </description>
	<link>https://www.akamai.com/blog/security/zero-trust-should-not-give-it-a-bad-name</link>
	<author>Robert Blumofe</author>
	<guid>https://www.akamai.com/blog/security/zero-trust-should-not-give-it-a-bad-name</guid>
	<pubDate>Thu, 29 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Holiday Readiness, Part One: What you Should be Thinking About Four Months Out—Security</title>
	<description>The beginning of August is upon us, and if you haven’t already started thinking about the busiest time of the year, now is a good time to do so. Whether you’re an experienced veteran of managing peak traffic or new to the game, Q4 can bring surprises when it comes to performance and security. And while it’s nearly impossible to prepare for every situation, there are a number of options and solutions available at Akamai to help manage the surge of traffic (both good and bad) that will be hitting the retail industry during the holiday season, especially on Black Friday and Cyber Monday.</description>
	<link>https://www.akamai.com/blog/trends/holiday-readiness-what-you-should-be-thinking-about-four-months</link>
	<author>Michael Hansen</author>
	<guid>https://www.akamai.com/blog/trends/holiday-readiness-what-you-should-be-thinking-about-four-months</guid>
	<pubDate>Thu, 29 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Critical 9.9 Vulnerability in Hyper-V Allowed Attackers to Exploit Azure</title>
	<description>Guardicore Labs, in collaboration with SafeBreach Labs, found a critical vulnerability in Hyper-V’s virtual network switch driver (vmswitch.sys).</description>
	<link>https://www.akamai.com/blog/security/critical-vulnerability-in-hyper-v-allowed-attackers-to-exploit-azure</link>
	<author>Ophir Harpaz &amp; Peleg Hadar</author>
	<guid>https://www.akamai.com/blog/security/critical-vulnerability-in-hyper-v-allowed-attackers-to-exploit-azure</guid>
	<pubDate>Wed, 28 Jul 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Software-Defined Networking Concept Adoption at Akamai</title>
	<description>Akamai engineering has adopted new technology concepts to enhance and expand routing capabilities at the edge. Previously, Akamai’s traffic-steering capabilities were mainly focused on DNS-based routing. In this article, we would like to give you an in-depth look at how Akamai has embraced new routing technology concepts and merged them into the Akamai edge to enhance routing capabilities, provide faster and better traffic steering, and offer even better performance.</description>
	<link>https://www.akamai.com/blog/performance/software-defined-networking-concept-adoption-at-akamai</link>
	<author>Eran Gal</author>
	<guid>https://www.akamai.com/blog/performance/software-defined-networking-concept-adoption-at-akamai</guid>
	<pubDate>Wed, 28 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Cutting the Red Tape: Lessons Learned from CyberThreats 2021</title>
	<description>If I had a dollar for every time I heard the phrase “digital transformation,” I would have a lot of dollars. I’m sure you would too. We’d have even more if we counted the term “Zero Trust.” (Maybe we should start counting them, now that I think about it!)
</description>
	<link>https://www.akamai.com/blog/news/cutting-the-red-tape-lessons-learned-from-cyberthreats-2021</link>
	<author>Bridget Meuse</author>
	<guid>https://www.akamai.com/blog/news/cutting-the-red-tape-lessons-learned-from-cyberthreats-2021</guid>
	<pubDate>Tue, 27 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>All Access Is (or Should Be) Remote Access</title>
	<description>With the transition to remote work, we often hear the term remote access used in unison. Typically, remote work application access is facilitated via a remote access mechanism and, presumably, local work application access is facilitated via a local access mechanism. But I argue that this connection does not really hold true. Sure, remote work does require the use of a remote access mechanism, but the mechanism can and should also be used for local work. There's really no such thing as local access.
</description>
	<link>https://www.akamai.com/blog/security/all-access-is-or-should-be-remote-access</link>
	<author>Robert Blumofe</author>
	<guid>https://www.akamai.com/blog/security/all-access-is-or-should-be-remote-access</guid>
	<pubDate>Tue, 27 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Anyone for Alphabet Soup? ZTNA, SWGs, MFA, and More: Lessons Learned from Fed Day CyberThreats 2021</title>
	<description>Last week, we gathered a few of the most prominent leaders and experts from every corner of the federal space to talk about all things cybersecurity and digital transformation. Discussions ranged from the move toward Zero Trust Network Access (ZTNA), and effectively managing identities and access with a secure web gateway (SWG) to keep data safe, to what the executive order on cybersecurity means for agencies -- time to implement a multi-factor authentication (MFA) solution. 
</description>
	<link>https://www.akamai.com/blog/news/anyone-for-alphabet-soup-ztna-swgs-mfa-and-more-lessons-learned</link>
	<author>Bridget Meuse</author>
	<guid>https://www.akamai.com/blog/news/anyone-for-alphabet-soup-ztna-swgs-mfa-and-more-lessons-learned</guid>
	<pubDate>Mon, 26 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>G2A's Journey to Global Growth, Part 1: Keeping Gamers and Geeks Playing During a Pandemic</title>
	<description>Near the end of March 2020, G2A.COM saw its traffic virtually double overnight. The pandemic had just begun, and people were looking for ways to stay entertained and connected under lockdown. Not surprisingly, a lot of people turned to video games, and G2A.COM was one of the first places they went to for affordable game keys and activation codes.
</description>
	<link>https://www.akamai.com/blog/performance/g2as-journey-to-global-growth-part-1-keeping-gamers-and-geeks</link>
	<author>Jonathan Singer</author>
	<guid>https://www.akamai.com/blog/performance/g2as-journey-to-global-growth-part-1-keeping-gamers-and-geeks</guid>
	<pubDate>Mon, 26 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Why Zero Trust Needs the Edge</title>
	<description>Backhauling traffic destroys performance, and backhauling attack traffic can destroy even more. Nevertheless, in a traditional security deployment model, we are faced with the lose-lose options of either backhauling all traffic to the security stack or allowing some accesses to not go through the security stack. Of course, in the modern world where cyberattacks can cause enormous damage, the latter option is not really an option at all. All traffic must route through a robust security stack. So how do we accomplish this goal without backhauling? The answer is Zero Trust security deployed and delivered as an edge service.
</description>
	<link>https://www.akamai.com/blog/security/why-zero-trust-needs-the-edge</link>
	<author>Robert Blumofe</author>
	<guid>https://www.akamai.com/blog/security/why-zero-trust-needs-the-edge</guid>
	<pubDate>Mon, 26 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Summarizes Service Disruption (RESOLVED)</title>
	<description>At 15:45 UTC on July 22, 2021, a software configuration update triggered a bug in our Secure Edge Content Delivery Network impacting that network's domain name service (DNS) system (the system that directs browsers to websites for that specific service). This caused a disruption impacting availability of some customer websites. The disruption lasted up to an hour. Upon rolling back the software configuration update, the services resumed normal operations.
</description>
	<link>https://www.akamai.com/blog/news/akamai-summarizes-service-disruption-resolved</link>
	<author>Mani Sundaram</author>
	<guid>https://www.akamai.com/blog/news/akamai-summarizes-service-disruption-resolved</guid>
	<pubDate>Thu, 22 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Zero Trust Network Access Is an Oxymoron</title>
	<description>Though Zero Trust is really quite simple and should be viewed as a very strong form of the age-old principle of least privilege, that does not mean that it is the same thing. In fact, one of the most significant differences from what came before is that when it comes to access, Zero Trust is based on application access, not network access. I was surprised, then, when Gartner's new SASE (secure access service edge) model included something called Zero Trust Network Access (ZTNA). This term is an oxymoron, and I make this point because it matters. The distinction between network access and application access is important.
</description>
	<link>https://www.akamai.com/blog/security/zero-trust-network-access-is-an-oxymoron</link>
	<author>Robert Blumofe</author>
	<guid>https://www.akamai.com/blog/security/zero-trust-network-access-is-an-oxymoron</guid>
	<pubDate>Tue, 20 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Zero Trust: Not As Scary As It Sounds</title>
	<description>If the term Zero Trust has been popping up in your news feed with astonishing frequency lately, you may be tempted to think that Zero Trust must be a brand-new technology cooked up in a research lab at MIT and powered by the latest artificial intelligence, machine learning, quantum computing, and a 1.21 gigawatt flux capacitor. In this and subsequent blog posts, I want to make the case that, in fact, Zero Trust is all about simplicity, and that at its core, Zero Trust is a strong form of the age-old principle of least privilege.</description>
	<link>https://www.akamai.com/blog/security/zero-trust-network-access-not-as-scary-as-it-sounds</link>
	<author>Robert Blumofe</author>
	<guid>https://www.akamai.com/blog/security/zero-trust-network-access-not-as-scary-as-it-sounds</guid>
	<pubDate>Thu, 15 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Kaseya Supply Chain Ransomware Attack</title>
	<description>On July 2, 2021, Kaseya disclosed an active attack against customers using its VSA product, and urged all on-premise customers to switch-off Kaseya VSA. Shortly before this alert, users on Reddit started describing ransomware incidents against managed security providers (MSPs), and the common thread among them was on-premise VSA deployments. In the hours to follow, several indicators of compromise (IOCs) were released, and Akamai was able to observe some of that traffic. A patch for the VSA product was released by Kaseya on July 11.
</description>
	<link>https://www.akamai.com/blog/security/kaseya-supply-chain-ransomware-attack</link>
	<author>Ryan Barnett</author>
	<guid>https://www.akamai.com/blog/security/kaseya-supply-chain-ransomware-attack</guid>
	<pubDate>Thu, 15 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Streaming Numbers Jump for European Football Tournament Delivered by Akamai</title>
	<description>The video streaming traffic that Akamai delivered for more than 30 rights-holding customers during the July 11 Italy-England football (soccer) final as part of the delayed-to-2021European soccer tournament peaked at 34.9 Tbps on the Akamai edge platform. The traffic peak during the final match was the highest that Akamai reached for the tournament and was nearly 5x greater than the 7.3 Tbps peak of the 2016 Portugal-France championship match. Traffic during the June 29, 2021, round-of-16 match between Germany and England was the second-highest peak for the tournament, reaching 33.9 Tbps; third-highest was the July 6 Italy-Spain semi-final at 32.6 Tbps. 
</description>
	<link>https://www.akamai.com/blog/performance/streaming-numbers-jump-for-european-football-tournament-delivered</link>
	<author>Chris Nicholson</author>
	<guid>https://www.akamai.com/blog/performance/streaming-numbers-jump-for-european-football-tournament-delivered</guid>
	<pubDate>Wed, 14 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Location-and Device-agnostic Security for the Mobile Workforce</title>
	<description>I've spent my entire career in technology and can still recall the time when a desktop PC was the only way to work. (Truth be told, I'm also old enough to remember dumb terminals.) I also remember my first company laptop -- a beast of a thing with a monochrome display so thick it came with an integrated 2.5" floppy drive and a battery life that made it barely usable. My first mobile phone was a Motorola Timeport, the first tri-band mobile phone that could work in Europe and North America. 
</description>
	<link>https://www.akamai.com/blog/performance/location-and-device-agnostic-security-for-the-mobile-workforce</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/performance/location-and-device-agnostic-security-for-the-mobile-workforce</guid>
	<pubDate>Wed, 14 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Mind the Gap: Securely Embracing the Digital Explosion</title>
	<description>State and local governments are weathering a digital explosion. The move to "virtual everything" means that greater amounts of information are being produced and transmitted electronically, but the digital infrastructure powering these operations is straining under the weight. 
</description>
	<link>https://www.akamai.com/blog/security/mind-the-gap-securely-embracing-the-digital-explosion</link>
	<author>Bridget Meuse</author>
	<guid>https://www.akamai.com/blog/security/mind-the-gap-securely-embracing-the-digital-explosion</guid>
	<pubDate>Tue, 13 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Zero Trust: The Protection Model for the Post-Pandemic World</title>
	<description>One year and a half following the start of the COVID-19 pandemic, we're seeing most companies either maintaining their remote work policies or slowly moving to a hybrid model. In fact, an estimated 36.2 million Americans will be working remotely by 2025, which is nearly double pre-pandemic levels.
</description>
	<link>https://www.akamai.com/blog/security/zero-trust-the-protection-model-for-the-post-pandemic-world</link>
	<author>Robert Blumofe</author>
	<guid>https://www.akamai.com/blog/security/zero-trust-the-protection-model-for-the-post-pandemic-world</guid>
	<pubDate>Tue, 13 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Helps Q-dance Bring Its Tribe to Defqon.1 at Home -- a Global Virtual Festival Experience</title>
	<description>Every year, Q-dance (part of the ID&amp;T group), a Dutch electronic music experience company, delights its die-hard fans (or their "tribe") at the world's largest hardstyle festival, Defqon.1. Helicopters, simulated earthquakes, special moments like Power Hour, and amazing shows make up the unique experience. </description>
	<link>https://www.akamai.com/blog/performance/akamai-helps-q-dance-bring-its-tribe-to-defqon-1-at-home-a-glance</link>
	<author>Ina Christova</author>
	<guid>https://www.akamai.com/blog/performance/akamai-helps-q-dance-bring-its-tribe-to-defqon-1-at-home-a-glance</guid>
	<pubDate>Thu, 08 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Your Employees Want Passwordless. Isn't It Time You Gave It to Them?</title>
	<description>I hate passwords. There, I said it. I dread getting an email from Akamai IT telling me it will soon be time to update my password. I procrastinate until the last possible moment instead of immediately doing what is actually a trivial process. I suspect I'm not alone in my dislike for passwords.
</description>
	<link>https://www.akamai.com/blog/security/your-employees-want-passwordless-isnt-it-time-you-gave-it-to-them</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/your-employees-want-passwordless-isnt-it-time-you-gave-it-to-them</guid>
	<pubDate>Wed, 07 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>The Countdown Has Started - The Move Toward Zero Trust and MFA</title>
	<description>In early May 2021, the President of the United States issued an executive order on cybersecurity, and though it will take some time for executive branch agencies to develop formal rules, the order itself includes a lot of what I consider to be best practice in cybersecurity, including the use of multi-factor authentication (MFA) and Zero Trust, mentioned by name. 
</description>
	<link>https://www.akamai.com/blog/security/the-countdown-has-started-the-move-toward-zero-trust-and-mfa</link>
	<author>Robert Blumofe</author>
	<guid>https://www.akamai.com/blog/security/the-countdown-has-started-the-move-toward-zero-trust-and-mfa</guid>
	<pubDate>Fri, 02 Jul 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>SMB Worm Indexsinas</title>
	<description>New details in the Indexsinas SMB worm, also dubbed NSABuffMiner. </description>
	<link>https://www.akamai.com/blog/security/smb-worm-indexsinas</link>
	<author>Liad Mordekoviz &amp; Ophir Harpaz</author>
	<guid>https://www.akamai.com/blog/security/smb-worm-indexsinas</guid>
	<pubDate>Wed, 30 Jun 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Threat That Never Went Away Is Back (with a Vengeance)</title>
	<description>What is your recollection of May 2017? Emmanuel Macron won the French election. The Ringling Bros. and Barnum &amp; Bailey Circus gave its final performance after a 146-year run. The U.S. FCC voted to overturn net neutrality rules. And the National Health Service in the United Kingdom was crippled by a massive ransomware attack that ended up costing over $120 million.
</description>
	<link>https://www.akamai.com/blog/security/the-threat-that-never-went-away-is-back-with-a-vengeance</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/the-threat-that-never-went-away-is-back-with-a-vengeance</guid>
	<pubDate>Tue, 29 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Perform a Zero Trust AWS Assessment with Infection Monkey and ScoutSuite</title>
	<description>Take action on issues highlighted in the report to ensure your AWS cloud defenses are protected in a data breach, minimizing impact and data loss.</description>
	<link>https://www.akamai.com/blog/security/monkey-scoutsuite-ztx</link>
	<author>Mike Salvatore</author>
	<guid>https://www.akamai.com/blog/security/monkey-scoutsuite-ztx</guid>
	<pubDate>Wed, 23 Jun 2021 14:34:00 UTC</pubDate>

</item>
<item>
	<title>Targeted Cache Control</title>
	<description>Content delivery networks (CDNs) have been around and have evolved over a long time (in internet years). They all speak HTTP and you can safely rely on them to work with just about anything else that speaks HTTP.</description>
	<link>https://www.akamai.com/blog/news/targeted-cache-control</link>
	<author>Stephen Ludin</author>
	<guid>https://www.akamai.com/blog/news/targeted-cache-control</guid>
	<pubDate>Wed, 23 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>World-Class OTT Streaming from MwareTV with Akamai</title>
	<description>Since the onset of the pandemic, home entertainment has never been more important. Millions of users across the globe have turned to over-the-top (OTT) streaming and live TV to bring much-needed diversion and exciting content into their lives. </description>
	<link>https://www.akamai.com/blog/performance/world-class-ott-streaming-from-mwaretv-with-akamai</link>
	<author>Ina Christova</author>
	<guid>https://www.akamai.com/blog/performance/world-class-ott-streaming-from-mwaretv-with-akamai</guid>
	<pubDate>Wed, 23 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Crypto Threats Surge by 500%, and It's All About the Money</title>
	<description>Previously reserved for early adopters and tech-savvy consumers, cryptocurrencies have gone mainstream -- with tech entrepreneurs and prominent financial institutions leading the charge.</description>
	<link>https://www.akamai.com/blog/security/crypto-threats-surge-by-500-and-its-all-about-the-money</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/crypto-threats-surge-by-500-and-its-all-about-the-money</guid>
	<pubDate>Tue, 22 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>NorthSec CTF 2021 Write Up: 'Impurity Assessment Form'</title>
	<description>This is a write up of a NorthSec 2021 CTF problem I solved with Allan Wirth (@Allan_Wirth) as part of team SaaS which finished in 3rd. It was an extremely creative problem to solve so I wanted to share it here. </description>
	<link>https://www.akamai.com/blog/security/northsec-ctf-2021-write-up-impurity-assessment-form</link>
	<author>Samuel Erb</author>
	<guid>https://www.akamai.com/blog/security/northsec-ctf-2021-write-up-impurity-assessment-form</guid>
	<pubDate>Tue, 22 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>New Admin Portal for Akamai Enterprise Application Access</title>
	<description>The definition of a user has evolved to comprise much more than an employee, making secure access to the right application, for the right user, at the right time difficult and complex. </description>
	<link>https://www.akamai.com/blog/news/new-admin-portal-for-akamai-enterprise-application-access</link>
	<author>Sanjay Sadarangani</author>
	<guid>https://www.akamai.com/blog/news/new-admin-portal-for-akamai-enterprise-application-access</guid>
	<pubDate>Mon, 21 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>HTTP/3 and QUIC: Past, Present, and Future</title>
	<description>You may have seen the announcements over the past two weeks -- the IETF QUIC RFCs have been published! That leads to a lot of questions, depending on how closely you've followed this space.</description>
	<link>https://www.akamai.com/blog/performance/http3-and-quic-past-present-and-future</link>
	<author>Mike Bishop</author>
	<guid>https://www.akamai.com/blog/performance/http3-and-quic-past-present-and-future</guid>
	<pubDate>Mon, 21 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>What A Funny App I Got Here!</title>
	<description>When you hear the word "malware",  the first thing that might come to your mind is a PC or laptop. You think about some weird advertising pop-ups or unrecognized processes running in the background.
</description>
	<link>https://www.akamai.com/blog/security/what-a-funny-app-i-got-here</link>
	<author>Aleksandra Blaszczyk </author>
	<guid>https://www.akamai.com/blog/security/what-a-funny-app-i-got-here</guid>
	<pubDate>Mon, 21 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Better Real User Monitoring with BoomerangJS and Akamai mPulse</title>
	<description>In this blog, we'll walk through a few different snippet insertion methods and available optimizations. </description>
	<link>https://www.akamai.com/blog/performance/better-real-user-monitoring-with-boomerangjs-and-akamai-mpulse</link>
	<author>Will Smithee</author>
	<guid>https://www.akamai.com/blog/performance/better-real-user-monitoring-with-boomerangjs-and-akamai-mpulse</guid>
	<pubDate>Sun, 20 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Provides Prolexic DDoS Service Impact Update (Status: Resolved)</title>
	<description>Akamai experienced an outage for one of its Prolexic DDoS services (Routed 3.0) starting at 4:20 AM UTC. We detected the issue immediately, and impacted customers received an error alert within seconds. The impact was limited to Akamai customers using version 3.0 of the Routed service.</description>
	<link>https://www.akamai.com/blog/news/akamai-provides-prolexic-ddos-service-impact-update</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/news/akamai-provides-prolexic-ddos-service-impact-update</guid>
	<pubDate>Thu, 17 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Stopping Ransomware and Lateral Movement with Segmentation</title>
	<description>Learn how to take on the growing ransomware threat, and the necessity of network segmentation from VP of Cyber Research, Amit Serper.</description>
	<link>https://www.akamai.com/blog/security/stopping-ransomware-with-segmentation</link>
	<author>Amit Serper</author>
	<guid>https://www.akamai.com/blog/security/stopping-ransomware-with-segmentation</guid>
	<pubDate>Wed, 16 Jun 2021 19:50:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Platform Update: New Security Enhancements That Intelligently Automate Application and API Security, Mitigate Online Fraud, and Reduce Burden on Security Professionals</title>
	<description>Today is Day 2 of Akamai's Platform Update. Yesterday, we talked about the acceleration of modern app development and how we're empowering users to shift more compute and data to the edge. </description>
	<link>https://www.akamai.com/blog/news/akamai-platform-update-new-security-enhancements-that-intelligently</link>
	<author>Charles Choe</author>
	<guid>https://www.akamai.com/blog/news/akamai-platform-update-new-security-enhancements-that-intelligently</guid>
	<pubDate>Wed, 16 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Platform Update: Akamai Boosts Edge Application Power, Expanding Possibilities for Developers</title>
	<description>Welcome to the Akamai Platform Update -- two days of new capabilities and innovations across our edge technology and security product portfolios.</description>
	<link>https://www.akamai.com/blog/news/platform-update-akamai-boosts-edge-application-power-expanding</link>
	<author>Alex Balford</author>
	<guid>https://www.akamai.com/blog/news/platform-update-akamai-boosts-edge-application-power-expanding</guid>
	<pubDate>Tue, 15 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>The Adaptive Security Engine – A Quantum Leap Forward for Application and API Protection</title>
	<description>At Akamai, our mission is to make application and API security highly effective and easy. As part of that effort, we are excited to announce the Adaptive Security Engine -- a new core technology powering Akamai's application and API protection offerings, designed to enable a hands-off approach to protecting web applications and APIs with the highest degree of confidence.  </description>
	<link>https://www.akamai.com/blog/security/the-adaptive-security-engine-a-quantum-leap-forward-for-application</link>
	<author>Amol Mathur</author>
	<guid>https://www.akamai.com/blog/security/the-adaptive-security-engine-a-quantum-leap-forward-for-application</guid>
	<pubDate>Mon, 14 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Trusting Locations Bites Us Yet Again</title>
	<description>Recently, Microsoft announced the discovery of yet another attack being launched by the now infamous Nobelium group, which has been responsible for numerous successful attacks, including the widespread SolarWinds breach in 2020.</description>
	<link>https://www.akamai.com/blog/news/trusting-locations-bites-us-yet-again</link>
	<author>Charlie Gero</author>
	<guid>https://www.akamai.com/blog/news/trusting-locations-bites-us-yet-again</guid>
	<pubDate>Mon, 07 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>How Network Segmentation Simplifies PCI DSS Compliance</title>
	<description>Read more about how proper network segmentation can simplify PCI DSS compliance by effectively reducing the number of assets in scope.</description>
	<link>https://www.akamai.com/blog/security/pci-dss-network-segmentation</link>
	<author>Tricia Howard</author>
	<guid>https://www.akamai.com/blog/security/pci-dss-network-segmentation</guid>
	<pubDate>Thu, 03 Jun 2021 17:57:00 UTC</pubDate>

</item>
<item>
	<title>Now Available: EdgeKV Distributed Key-Value Store</title>
	<description>We're excited to announce the availability of EdgeKV, a distributed key-value store database that enables EdgeWorkers to leverage data stored at the edge when deploying custom code across our serverless computing platform.</description>
	<link>https://www.akamai.com/blog/news/now-available-edgekv-distributed-key-value-store</link>
	<author>Josh Johnson</author>
	<guid>https://www.akamai.com/blog/news/now-available-edgekv-distributed-key-value-store</guid>
	<pubDate>Thu, 03 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>How Enigmo Moved Logic from Client to Origin to Edge</title>
	<description>Enigmo owns BUYMA, a Japanese fashion C2C marketplace that helps people buy and sell high-quality goods from overseas on www.buyma.com. </description>
	<link>https://www.akamai.com/blog/edge/how-enigmo-moved-logic-from-client-to-origin-to-edge</link>
	<author>Hideki Ito</author>
	<guid>https://www.akamai.com/blog/edge/how-enigmo-moved-logic-from-client-to-origin-to-edge</guid>
	<pubDate>Tue, 01 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>The Rapid Resurgence of DDoS Extortion (That Didn't Take Long)</title>
	<description>Just when we thought DDoS extortion was fading into the rearview mirror, it's time to circle up the trucks again (gas tanks full). </description>
	<link>https://www.akamai.com/blog/news/the-rapid-resurgence-of-ddos-extortion-that-didnt-take-long</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/news/the-rapid-resurgence-of-ddos-extortion-that-didnt-take-long</guid>
	<pubDate>Tue, 01 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>SOGo and PacketFence Impacted by SAML Implementation Vulnerabilities</title>
	<description>Part of Akamai's incident management process for vulnerabilities in third party software involves verifying potential impact in other systems using the same or similar libraries. </description>
	<link>https://www.akamai.com/blog/news/sogo-and-packetfence-impacted-by-saml-implementation-vulnerabilities</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/news/sogo-and-packetfence-impacted-by-saml-implementation-vulnerabilities</guid>
	<pubDate>Tue, 01 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>SAML Implementation Vulnerability Impacting Some Akamai Services</title>
	<description>This blog post provides an overview of a vulnerability discovered in Akamai's Enterprise Application Access (EAA) product which has been patched. </description>
	<link>https://www.akamai.com/blog/news/saml-implementation-vulnerability-impacting-some-akamai-services</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/news/saml-implementation-vulnerability-impacting-some-akamai-services</guid>
	<pubDate>Tue, 01 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai EAA Impersonation Vulnerability - A Deep Dive</title>
	<description>In this post, we cover the technical details of CVE-2021-28091, the vulnerability impacting Akamai's Enterprise Application Access (EAA) platform. </description>
	<link>https://www.akamai.com/blog/news/akamai-eaa-impersonation-vulnerability-a-deep-dive</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/news/akamai-eaa-impersonation-vulnerability-a-deep-dive</guid>
	<pubDate>Tue, 01 Jun 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>5 Benefits of Network Segmentation</title>
	<description>Learn more about how microsegmentation can enable you to achieve granular network segmentation, quickly and securely.</description>
	<link>https://www.akamai.com/blog/security/network-segmentation-benefits</link>
	<author>Tricia Howard</author>
	<guid>https://www.akamai.com/blog/security/network-segmentation-benefits</guid>
	<pubDate>Fri, 28 May 2021 15:14:00 UTC</pubDate>

</item>
<item>
	<title>Edge DNS Secondary Implementation: Order of Operations for NS Zone and Registrar Records</title>
	<description>Akamai Edge DNS service delivers edge-based, authoritative domain services for thousands of organizations.</description>
	<link>https://www.akamai.com/blog/edge/edge-dns-secondary-implementation-order-of-operations-for-ns-zone</link>
	<author>Sam Preston</author>
	<guid>https://www.akamai.com/blog/edge/edge-dns-secondary-implementation-order-of-operations-for-ns-zone</guid>
	<pubDate>Thu, 27 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>ThinkPHP Exploit Actively Exploited in the Wild</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/thinkphp-exploit-actively-exploited-in-the-wild</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/thinkphp-exploit-actively-exploited-in-the-wild</guid>
	<pubDate>Wed, 26 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>It's Official - Akamai is a Great Place to Work</title>
	<description>When Akamai Costa Rica won the 'Great Place to Work' award, we were delighted. It's a wonderful achievement that really means a lot to Akamai and to all the collaborators who have worked here. It highlights the great working environment that Akamai have created for us. But it also shines a light on all the contributions made by our collaborators over the years.</description>
	<link>https://www.akamai.com/blog/culture/its-official-we-are-a-great-place-to-work-andres-gonzalez</link>
	<author>Andres Gonzalez</author>
	<guid>https://www.akamai.com/blog/culture/its-official-we-are-a-great-place-to-work-andres-gonzalez</guid>
	<pubDate>Tue, 25 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Romanian Crypto Mining Infection</title>
	<description>While examining my honeypot logs and digging through the newly downloaded binaries last week, I noticed a large compressed file. I figured it would be a crypto miner, typically a tar archive and gzip (normally erroneously) compressed. I moved the archive over to my test lab and started examining the contents.
</description>
	<link>https://www.akamai.com/blog/security/romanian-crypto-mining-infection</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/romanian-crypto-mining-infection</guid>
	<pubDate>Mon, 24 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Digital Transformation Usain Bolt-Style: Health Care's Sprint to Modernization</title>
	<description>In the present age, patients now use smartphone apps to schedule doctor's visits, contact insurance companies, and get prescriptions instead of picking up the phone.</description>
	<link>https://www.akamai.com/blog/cloud/digital-transformation-usain-bolt-style-health-cares-sprint-to-modernization</link>
	<author>Bridget Meuse</author>
	<guid>https://www.akamai.com/blog/cloud/digital-transformation-usain-bolt-style-health-cares-sprint-to-modernization</guid>
	<pubDate>Fri, 21 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Why FIDO2 Is the Answer to Better Security</title>
	<description>A groundbreaking increase in security incidents is affecting governments around the world. In light of this, the United States issued a formal order to implement a robust set of security measures designed to improve the security of federal systems.</description>
	<link>https://www.akamai.com/blog/news/why-fido2-is-the-answer-to-better-security</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/news/why-fido2-is-the-answer-to-better-security</guid>
	<pubDate>Fri, 21 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Why FIDO2 is the Answer to Better Security </title>
	<description>A groundbreaking increase in security incidents is affecting governments around the world. In light of this, the United States issued a formal order to implement a robust set of security measures designed to improve the security of federal systems. In his most recent executive order, President Biden acknowledged that the United States and many other governments around the world are facing increasing malicious cyberattacks. In order to prevent,  and recover from security incidents, the President is pushing to significantly improve the government's security stack, including the implementation of multi-factor authentication (MFA). In this post, I'll discuss how the government's plan to leverage MFA could be even better. </description>
	<link>https://www.akamai.com/blog/security/why-fido2-is-the-answer-to-better-security-</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/why-fido2-is-the-answer-to-better-security-</guid>
	<pubDate>Fri, 21 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>How Does Ransomware Actually Spread?</title>
	<description>We all know the damage ransomware can do - but how does ransomware actually spread? Our blog shows you how - and how it can be stopped.</description>
	<link>https://www.akamai.com/blog/security/how-ransomware-actually-spreads</link>
	<author>Tricia Howard</author>
	<guid>https://www.akamai.com/blog/security/how-ransomware-actually-spreads</guid>
	<pubDate>Thu, 20 May 2021 16:24:00 UTC</pubDate>

</item>
<item>
	<title>XITE Music Video Platform Amplifies Entertainment with Akamai's Help</title>
	<description>With so many people around the globe seeking socially distanced fun and solace, at-home entertainment has never been more important. XITE aims to offer the best music video experience in the world. Akamai is delighted that this exciting, interactive video platform chose to work with us to provide high-quality, secure online video, which enables XITE to deliver on the experience its fans have come to love.

</description>
	<link>https://www.akamai.com/blog/performance/xite-music-video-platform-amplifies-entertainment-with-akamais-help</link>
	<author>Ralph Aantjes </author>
	<guid>https://www.akamai.com/blog/performance/xite-music-video-platform-amplifies-entertainment-with-akamais-help</guid>
	<pubDate>Wed, 19 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title> A/B Testing, Now with EdgeKV</title>
	<description>Now that we've written the framework of our code, let's layer in EdgeKV (EKV), our distributed key-value store database.</description>
	<link>https://www.akamai.com/blog/developers/ab-testing-now-with-edgekv</link>
	<author>Jeffrey Costa</author>
	<guid>https://www.akamai.com/blog/developers/ab-testing-now-with-edgekv</guid>
	<pubDate>Tue, 18 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title> How Akamai Employees Showed Up for Akamai Earth Month</title>
	<description>Akamai employees across the globe showed up in full force for Akamai Earth Month 2021 -- our campaign to help employees take small actions at home and in their community to make a difference for the planet. </description>
	<link>https://www.akamai.com/blog/culture/how-akamai-employees-showed-up-for-akamai-earth-month</link>
	<author>Courtney Hadden</author>
	<guid>https://www.akamai.com/blog/culture/how-akamai-employees-showed-up-for-akamai-earth-month</guid>
	<pubDate>Thu, 13 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Partnering With Verizon on the 2021 DBIR</title>
	<description>By the time you read this post, the 2021 Verizon Data Breach Investigation Report (DBIR) will be published. Akamai has been one of the many partners contributing data to this report for more than half a decade. We greatly value the time, effort, and dedicated data science that goes into providing this level of research to the security community.  
</description>
	<link>https://www.akamai.com/blog/security/partnering-with-verizon-on-the-2021-dbir</link>
	<author>Martin McKeay</author>
	<guid>https://www.akamai.com/blog/security/partnering-with-verizon-on-the-2021-dbir</guid>
	<pubDate>Thu, 13 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Visualize and Analyze Bots With Real User Monitoring</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/visualize-bots-with-real-user-monitoring</link>
	<author>Hitoshi Kaneko</author>
	<guid>https://www.akamai.com/blog/security/visualize-bots-with-real-user-monitoring</guid>
	<pubDate>Wed, 12 May 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Visualize and Analyze Bots with Real User Monitoring</title>
	<description>You interact with more than just customers on your website. Bots make up a disproportionate amount of traffic, which can skew human behavior analysis data -- and cause you to make the wrong business decisions. </description>
	<link>https://www.akamai.com/blog/security/visualize-and-analyze-bots-with-real-user-monitoring</link>
	<author>Hitoshi Kaneko</author>
	<guid>https://www.akamai.com/blog/security/visualize-and-analyze-bots-with-real-user-monitoring</guid>
	<pubDate>Wed, 12 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Why Developers Are Writing Apps on Our Edge Platform</title>
	<description>A lot of companies talk about edge computing today, but at Akamai, we've been doing it for more than 20 years. </description>
	<link>https://www.akamai.com/blog/trends/why-developers-are-writing-apps-on-our-edge-platform</link>
	<author>Tom Leighton</author>
	<guid>https://www.akamai.com/blog/trends/why-developers-are-writing-apps-on-our-edge-platform</guid>
	<pubDate>Tue, 11 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Defeating the Pirates</title>
	<description>In Akamai's paper, "Inside the World of Video Pirates," we discovered why digital intellectual property theft (aka "piracy") is possibly the most misunderstood form of cybercrime facing the TV, sports, and film industries. </description>
	<link>https://www.akamai.com/blog/security/defeating-the-pirates</link>
	<author>Ian Munford</author>
	<guid>https://www.akamai.com/blog/security/defeating-the-pirates</guid>
	<pubDate>Thu, 06 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Two Years of Tax Phishing - The Oldest Scam in the Book</title>
	<description>Tax scams are some of the oldest scams in a criminal's book, and they're highly attractive to criminals for many reasons. </description>
	<link>https://www.akamai.com/blog/security/two-years-of-tax-phishing-the-oldest-scam-in-the-book</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/two-years-of-tax-phishing-the-oldest-scam-in-the-book</guid>
	<pubDate>Wed, 05 May 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Ohana —  An Impact an ERG Can Make</title>
	<description>Akamai's Ohana ERG launched in 2015, along with a number of other ERGs, with the mission to broaden and facilitate the inclusion and contributions of employees of African American, Black, Hispanic, and Latin American descent and association.</description>
	<link>https://www.akamai.com/blog/culture/ohana-an-impact-an-erg-can-make</link>
	<author>Alex Caro</author>
	<guid>https://www.akamai.com/blog/culture/ohana-an-impact-an-erg-can-make</guid>
	<pubDate>Fri, 30 Apr 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>CISA Emergency Directive 21-03: VPN Vulnerabilities Actively Exploited</title>
	<description>On April 20, 2021, the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) released an alert on the exploitation of Pulse Connect Secure Vulnerabilities with Alert AA21-110A: Exploitation of Pulse Connect Secure Vulnerabilities, as well as Emergency Directive (ED) 21-03, after a FireEye blog shed light on security incidents involving compromises of Pulse Secure VPN appliances.</description>
	<link>https://www.akamai.com/blog/news/cisa-emergency-directive-21-03-vpn-vulnerabilities-actively-exploited</link>
	<author>Patrick Sullivan</author>
	<guid>https://www.akamai.com/blog/news/cisa-emergency-directive-21-03-vpn-vulnerabilities-actively-exploited</guid>
	<pubDate>Thu, 29 Apr 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Anyone For a Smart Network Slice?</title>
	<description>As with any standardization effort, development of 5G specifications accounted for numerous technology trends and new use cases.</description>
	<link>https://www.akamai.com/blog/security/anyone-for-a-smart-network-slice</link>
	<author>Mick Higgins</author>
	<guid>https://www.akamai.com/blog/security/anyone-for-a-smart-network-slice</guid>
	<pubDate>Thu, 29 Apr 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Supporting Akamai Communities Impacted by COVID-19</title>
	<description>While those of us in places like the U.S. are experiencing some relief with access to the COVID-19 vaccine, it has been heartbreaking to see surges in infection, hospitalization, and death across the globe, including the dire situation in India. </description>
	<link>https://www.akamai.com/blog/news/supporting-akamai-communities-impacted-by-covid-19</link>
	<author>Mani Sundaram</author>
	<guid>https://www.akamai.com/blog/news/supporting-akamai-communities-impacted-by-covid-19</guid>
	<pubDate>Wed, 28 Apr 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Observed Changes to the Threat Landscape in 2020</title>
	<description>Reflecting on the cybersecurity threat landscape in 2020, we can't overlook the massive changes that landed on us. Global security attacks increased at a significant pace between 2019 and 2020, and the COVID-19 pandemic only deepened these troubling conditions. </description>
	<link>https://www.akamai.com/blog/trends/observed-changes-to-the-threat-landscape-in-2020</link>
	<author>Shiran Guez</author>
	<guid>https://www.akamai.com/blog/trends/observed-changes-to-the-threat-landscape-in-2020</guid>
	<pubDate>Wed, 28 Apr 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Don't Risk Getting Caught by Kr3pto Phishing Kits</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/dont-risk-getting-caught-by-kr3pto-phishing-kits</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/dont-risk-getting-caught-by-kr3pto-phishing-kits</guid>
	<pubDate>Mon, 26 Apr 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Announcing Akamai's 2030 Sustainability Goals</title>
	<description>There are 4.66 billion (yes, with a B) internet users. Rough math will tell us that's three in every five people around the world -- talk about lessening the six degrees. I see head nods and shoulder shrugs. 4.66 billion people?</description>
	<link>https://www.akamai.com/blog/culture/announcing-akamais-2030-sustainability-goals</link>
	<author>Mike Mattera</author>
	<guid>https://www.akamai.com/blog/culture/announcing-akamais-2030-sustainability-goals</guid>
	<pubDate>Thu, 22 Apr 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Innovative Ways Customers Compute on the Edge</title>
	<description>Moving everything closer to the edge is the key to delivering better, faster experiences to people through billions of devices around the world. </description>
	<link>https://www.akamai.com/blog/trends/innovative-ways-customers-compute-on-the-edge</link>
	<author>CJ Arnesen</author>
	<guid>https://www.akamai.com/blog/trends/innovative-ways-customers-compute-on-the-edge</guid>
	<pubDate>Thu, 22 Apr 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Recognized as 2021 Gartner Peer Insights Customers' Choice for Web Application Firewalls</title>
	<description>Akamai has been named a Gartner Peer Insights Customers' Choice for Web Application Firewalls (for the second time). </description>
	<link>https://www.akamai.com/blog/news/akamai-recognized-as-2021-gartner-peer-insights-customers-choice</link>
	<author>Lorenz Jakober</author>
	<guid>https://www.akamai.com/blog/news/akamai-recognized-as-2021-gartner-peer-insights-customers-choice</guid>
	<pubDate>Mon, 19 Apr 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Building an A/B Test with EdgeWorkers and EdgeKV</title>
	<description>When paired with our new EdgeKV distributed key-value database, the Akamai EdgeWorkers serverless platform gives you the ability to do powerful things at the CDN level.</description>
	<link>https://www.akamai.com/blog/developers/building-an-a-b-test-with-edgeworkers-and-edgekv</link>
	<author>Jeffrey Costa</author>
	<guid>https://www.akamai.com/blog/developers/building-an-a-b-test-with-edgeworkers-and-edgekv</guid>
	<pubDate>Sat, 17 Apr 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Adapting Security to Work Anywhere</title>
	<description>"Working from home 2021" was the title of my talk at The Cyber Security Summit in January, and the strikethrough is important.</description>
	<link>https://www.akamai.com/blog/security/adapting-security-to-work-anywhere</link>
	<author>Richard Meeus</author>
	<guid>https://www.akamai.com/blog/security/adapting-security-to-work-anywhere</guid>
	<pubDate>Wed, 14 Apr 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Taking Action This Earth Month</title>
	<description>There's a fascinating human phenomenon often studied in the behavioral science field called the intention-action gap.</description>
	<link>https://www.akamai.com/blog/culture/taking-action-this-earth-month</link>
	<author>Kenda Carlson</author>
	<guid>https://www.akamai.com/blog/culture/taking-action-this-earth-month</guid>
	<pubDate>Tue, 13 Apr 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title> Gambling, Streaming Traffic Up During Men's College Basketball Tourney</title>
	<description>Gambling industry-related web traffic delivered by Akamai jumped 31% over the category average for all of Q4 2020 on March 31st.</description>
	<link>https://www.akamai.com/blog/performance/gambling-streaming-traffic-up-during-mens-college-basketball</link>
	<author>Chris Nicholson</author>
	<guid>https://www.akamai.com/blog/performance/gambling-streaming-traffic-up-during-mens-college-basketball</guid>
	<pubDate>Mon, 12 Apr 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Titans 2020: Celebrating Outstanding Achievements</title>
	<description>To Akamai's Co-Founder Danny Lewin, calling someone a "Titan" was the highest praise he would give. Danny himself was a remarkably talented and hard-working leader whose heart, passion, and spirit still inspire us. </description>
	<link>https://www.akamai.com/blog/culture/akamai-titans-2020-celebrating-outstanding-achievements</link>
	<author>PJ Joseph</author>
	<guid>https://www.akamai.com/blog/culture/akamai-titans-2020-celebrating-outstanding-achievements</guid>
	<pubDate>Fri, 09 Apr 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Caught on Camera: Rethinking IoT Security</title>
	<description>We all know that we're on camera pretty much constantly -- most coffee shops, convenience stores, and even offices employ security cameras for protection. But what happens when those devices built to keep us safe become unsafe?</description>
	<link>https://www.akamai.com/blog/security/caught-on-camera-rethinking-iot-security</link>
	<author>Mani Sundaram</author>
	<guid>https://www.akamai.com/blog/security/caught-on-camera-rethinking-iot-security</guid>
	<pubDate>Fri, 09 Apr 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Emerging Edge Computing Use Cases</title>
	<description>The first rule of edge compute thought leadership is: don't overuse the term edge. Over the course of my blog series on the topic, I have defined the edge, explained edge computing, and discussed the economics of edge computing. </description>
	<link>https://www.akamai.com/blog/edge/emerging-edge-computing-use-cases</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/edge/emerging-edge-computing-use-cases</guid>
	<pubDate>Thu, 08 Apr 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Tax Season: Criminals Play the Numbers Game Too</title>
	<description>Criminals love tax season. The stress and urgency surrounding this time of year makes the victim pool highly vulnerable to various types of schemes.</description>
	<link>https://www.akamai.com/blog/security/tax-season-criminals-play-the-numbers-game-too</link>
	<author>Steve Ragan</author>
	<guid>https://www.akamai.com/blog/security/tax-season-criminals-play-the-numbers-game-too</guid>
	<pubDate>Tue, 06 Apr 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>2021: Volumetric DDoS Attacks Rising Fast</title>
	<description>In our 2020 DDoS retrospective, we highlighted the twists and turns of a very, very active threat landscape. As a quick refresher, we mitigated some of the largest attacks ever seen (1.44 Tbps and 809 Mpps); </description>
	<link>https://www.akamai.com/blog/security/2021-volumetric-ddos-attacks-rising-fast</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/2021-volumetric-ddos-attacks-rising-fast</guid>
	<pubDate>Wed, 31 Mar 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>4 Helpful Features for Centra Users - Policy Monitoring and More</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/guardicore-4-helpful-features-for-centra-users</link>
	<author>Guardicore Labs Team</author>
	<guid>https://www.akamai.com/blog/security/guardicore-4-helpful-features-for-centra-users</guid>
	<pubDate>Mon, 29 Mar 2021 13:00:00 UTC</pubDate>

</item>
<item>
	<title>CVE-2020-15915 -- Quest for KACE blind SQLi</title>
	<description>At Akamai, the Enterprise Security Red Team (ESRT) continuously strives to evaluate the security of both our external and internal services. </description>
	<link>https://www.akamai.com/blog/security/cve-2020-15915-quest-for-kace-blind-sqli</link>
	<author>Samuel Erb</author>
	<guid>https://www.akamai.com/blog/security/cve-2020-15915-quest-for-kace-blind-sqli</guid>
	<pubDate>Fri, 26 Mar 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>The Akamai Foundation: Our Chance to Give Back</title>
	<description>The Akamai Foundation was set up in 2018 to improve the impact and focus of our long-term philanthropic activities.</description>
	<link>https://www.akamai.com/blog/culture/akamai-foundation-our-chance-to-give-back-by-kim-salem-jackson</link>
	<author>Kim Salem-Jackson</author>
	<guid>https://www.akamai.com/blog/culture/akamai-foundation-our-chance-to-give-back-by-kim-salem-jackson</guid>
	<pubDate>Wed, 24 Mar 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Authentication: Lessons Learned From Microsoft Exchange  And F5 Big-IP Hacks</title>
	<description>The past month has been a very dynamic time in the world of security for hackers and threat researchers, but it has been an extended nightmare for CSOs responsible for securing their enterprise networks. </description>
	<link>https://www.akamai.com/blog/news/authentication-lessons-learned-from-microsoft-exchange-and-f5</link>
	<author>Charlie Gero</author>
	<guid>https://www.akamai.com/blog/news/authentication-lessons-learned-from-microsoft-exchange-and-f5</guid>
	<pubDate>Wed, 24 Mar 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Focused on What's Next Following New Traffic Milestone</title>
	<description>Akamai hit a new milestone last week when web traffic delivered across our edge network peaked at 200 terabits per second (Tbps).</description>
	<link>https://www.akamai.com/blog/trends/akamai-focused-following-new-traffic-milestone</link>
	<author>Adam Karon</author>
	<guid>https://www.akamai.com/blog/trends/akamai-focused-following-new-traffic-milestone</guid>
	<pubDate>Wed, 24 Mar 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Threat Advisory - DCCP for (D)DoS</title>
	<description>Recent attacks against Akamai customers have leveraged a networking protocol known as protocol 33, or Datagram Congestion Control Protocol (DCCP).  </description>
	<link>https://www.akamai.com/blog/security/threat-advisory-dccp-for-ddos</link>
	<author>Chad Seaman</author>
	<guid>https://www.akamai.com/blog/security/threat-advisory-dccp-for-ddos</guid>
	<pubDate>Tue, 23 Mar 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>4 Techniques for Early Ransomware Detection</title>
	<description>If you receive a ransom note, it’s already too late. Detect and stop ransomware attacks early in the kill chain with these 4 techniques.</description>
	<link>https://www.akamai.com/blog/security/4-techniques-for-early-ransomware-detection</link>
	<author>Avishag Daniely</author>
	<guid>https://www.akamai.com/blog/security/4-techniques-for-early-ransomware-detection</guid>
	<pubDate>Sun, 21 Mar 2021 18:40:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Launch Cohort 2 of Accelerator Program For Early-Stage Innovations in Water</title>
	<description>Akamai Technologies India Pvt. Ltd. has chosen the grantees for Cohort 2 of Accelerator Program for Early-Stage Innovations in Water.</description>
	<link>https://www.akamai.com/blog/culture/akamai-launch-cohort-2-of-accelerator-program-for-early-stage-innovations</link>
	<author>Neha Jain</author>
	<guid>https://www.akamai.com/blog/culture/akamai-launch-cohort-2-of-accelerator-program-for-early-stage-innovations</guid>
	<pubDate>Fri, 19 Mar 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>The Edge is Becoming More Critical in a World of 5G and IoT</title>
	<description>The edge is becoming more critical in a world of 5G and IoT. I've seen the evolution from 1x to 3G to 4G and now 5G over the many years I've worked in the mobile space, and 5G and IoT will drive the biggest changes we have seen on the edge in 10 or 20 years.</description>
	<link>https://www.akamai.com/blog/edge/the-edge-is-becoming-more-critical-in-a-world-of-5g-and-iot</link>
	<author>Jonathan Morgan </author>
	<guid>https://www.akamai.com/blog/edge/the-edge-is-becoming-more-critical-in-a-world-of-5g-and-iot</guid>
	<pubDate>Fri, 19 Mar 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Finding the Cracks in the Wall - How Modern Scams Bypass MFA</title>
	<description>In my previous blog, I discussed the important role multi-factor authentication (MFA) plays in further securing access to enterprise and consumer services. We also established the fact that although MFA increases authentication security and decreases the risk of account takeover, MFA can, and is, being bypassed in the wild.</description>
	<link>https://www.akamai.com/blog/security/finding-the-cracks-in-the-wall-how-modern-scams-bypass-mfa-blog2</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/finding-the-cracks-in-the-wall-how-modern-scams-bypass-mfa-blog2</guid>
	<pubDate>Wed, 17 Mar 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Phish-Proof Multi-Factor Authentication with Akamai MFA</title>
	<description>Today, Akamai announced Akamai MFA, a phish-proof multi-factor authentication (MFA) service for the workforce that delivers all of the security benefits of FIDO2 with the frictionless end-user experience of a mobile push on a smartphone. Why has Akamai introduced this new service?</description>
	<link>https://www.akamai.com/blog/security/phish-proof-multi-factor-authentication-with-akamai-mfa-blog-3</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/phish-proof-multi-factor-authentication-with-akamai-mfa-blog-3</guid>
	<pubDate>Tue, 16 Mar 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Finding the Cracks in the Wall - The Hazard of Single Authentication Factor</title>
	<description>The use of authentication factors, one of the most fundamental and well understood concepts in information security, enables secure access to applications, services, and networks. It can affect an enterprise's security posture, however, as the drastic increase in data breaches and system attacks are largely based on compromised authentication.
</description>
	<link>https://www.akamai.com/blog/security/finding-the-cracks-in-the-wall-the-hazard-of-single-authentication-factor</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/finding-the-cracks-in-the-wall-the-hazard-of-single-authentication-factor</guid>
	<pubDate>Tue, 16 Mar 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Another Golang Crypto Miner On the Loose</title>
	<description>There are many crypto mining malware variants infecting systems on the internet. On Friday, March 4, 2021, I noticed an interesting hit in my honeypot logs.  The binary it captured stood out, as it was rather large at 4MB.  I immediately thought it would be a crypto miner written in the Go language. I was correct. This one however, has some newer exploits it's using for proliferation.</description>
	<link>https://www.akamai.com/blog/security/another-golang-crypto-miner-on-the-loose</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/another-golang-crypto-miner-on-the-loose</guid>
	<pubDate>Tue, 16 Mar 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>How Akamai Can Help You Fight the Latest Exploitation Attempts Against Microsoft Exchange</title>
	<description>On March 2, 2021, the Microsoft Security Response Center alerted its customers to several critical security updates to Microsoft Exchange Server, addressing vulnerabilities currently under attack. </description>
	<link>https://www.akamai.com/blog/security/appsec-protections-for-microsoft-exchange-cve</link>
	<author>Amol Mathur</author>
	<guid>https://www.akamai.com/blog/security/appsec-protections-for-microsoft-exchange-cve</guid>
	<pubDate>Mon, 15 Mar 2021 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Microsoft Exchange and Verkada Hacks: Isolate Your Apps and APIs from the Internet Cesspool</title>
	<description>It's been an interesting start to March in terms of public security incidents. This month kicked off with multiple zero-day exploits being used to attack on-premises versions of Microsoft Exchange Server. And, as if that wasn't enough, that attack was quickly followed by the news that a hacktivist </description>
	<link>https://www.akamai.com/blog/security/microsoft-exchange-and-verkada-hacks-isolate-your-apps-and-apis-from-the-internet-cesspool</link>
	<author>Lorenz Jakober</author>
	<guid>https://www.akamai.com/blog/security/microsoft-exchange-and-verkada-hacks-isolate-your-apps-and-apis-from-the-internet-cesspool</guid>
	<pubDate>Sun, 14 Mar 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Act Against Geopiracy with Enhanced Proxy Detection</title>
	<description>According to the description, the service is a virtual private network (VPN) desktop application and proxy browser extension that helps viewers mask their physical location, circumvent censorship, and restore access to blocked content.</description>
	<link>https://www.akamai.com/blog/performance/act-against-geopiracy-with-enhanced-proxy-detection</link>
	<author>Sandeep Singh</author>
	<guid>https://www.akamai.com/blog/performance/act-against-geopiracy-with-enhanced-proxy-detection</guid>
	<pubDate>Fri, 12 Mar 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Offers Free Tier for Client-Side Edge Security</title>
	<description>In March 2020, Akamai saw a dramatic 30% rise in internet traffic -- equivalent to an entire year of growth. Post-pandemic, we believe there will be a return to normal internet traffic growth, but many things will never be the same.</description>
	<link>https://www.akamai.com/blog/security/akamai-offers-free-tier-for-client-side-edge-security</link>
	<author>Mike Kane</author>
	<guid>https://www.akamai.com/blog/security/akamai-offers-free-tier-for-client-side-edge-security</guid>
	<pubDate>Fri, 12 Mar 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>EdgeKV: Serverless Storage at the Edge</title>
	<description>We are pleased to announce the launch of EdgeKV, our distributed key-value store, into beta! EdgeKV is enabling technology for EdgeWorkers, our serverless computing platform that enables developers to create services using JavaScript and deploy them across our platform. When writing JavaScript, data persistence is often necessary to save data from a user interaction, or to retrieve contextual data to evaluate inside a function.</description>
	<link>https://www.akamai.com/blog/edge/serverless-storage-at-the-edge-edgekv-beta</link>
	<author>Jeffrey Costa</author>
	<guid>https://www.akamai.com/blog/edge/serverless-storage-at-the-edge-edgekv-beta</guid>
	<pubDate>Wed, 10 Mar 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Now Launching - SOTI: Research</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/now-launching-soti-research</link>
	<author>Amanda Goedde</author>
	<guid>https://www.akamai.com/blog/security/now-launching-soti-research</guid>
	<pubDate>Wed, 10 Mar 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Finding the Best Servers to Answer Queries — Edge DNS and Anycast</title>
	<description>While Unicast defines a single destination endpoint for a given IP, Anycast is an addressing technique in which the same IP is advertised from multiple servers simultaneously. </description>
	<link>https://www.akamai.com/blog/edge/finding-the-best-servers-to-answer-queries-edge-dns-and-anycast</link>
	<author>Sam Preston</author>
	<guid>https://www.akamai.com/blog/edge/finding-the-best-servers-to-answer-queries-edge-dns-and-anycast</guid>
	<pubDate>Tue, 09 Mar 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Sensor Architecture Can Help Keep Us Up and Running: Part 2</title>
	<description>Previously, I introduced the field of sensor systems architecture and posed a real world example scenario of the unnecessary resource costs and hazards that can happen when the deployment of sensors isn't carefully thought out. </description>
	<link>https://www.akamai.com/blog/security/sensor-architecture-can-help-keep-us-up-and-running-part-2</link>
	<author>Kristin Nelson-Patel</author>
	<guid>https://www.akamai.com/blog/security/sensor-architecture-can-help-keep-us-up-and-running-part-2</guid>
	<pubDate>Tue, 09 Mar 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Startup Program: Fostering Innovation</title>
	<description>Akamai, the intelligent edge platform for securing and delivering digital experiences, continues to focus on innovation by launching Cohort 2 of the Akamai Startup program.</description>
	<link>https://www.akamai.com/blog/news/akamai-startup-program-fostering-innovation</link>
	<author>Arjun Rampal</author>
	<guid>https://www.akamai.com/blog/news/akamai-startup-program-fostering-innovation</guid>
	<pubDate>Mon, 08 Mar 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Is MFA a Security Illusion?</title>
	<description>A recent Akamai Security blog post, Massive Campaign Targeting UK Banks Bypassing 2FA, written by my colleague Or Katz, is a great insight into how attackers used very simple techniques to bypass two-factor (2FA) authentication security to obtain access to U.K. consumers' bank accounts. </description>
	<link>https://www.akamai.com/blog/security/is-mfa-a-security-illusion</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/is-mfa-a-security-illusion</guid>
	<pubDate>Mon, 08 Mar 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Sensor Architecture Can Help Keep Us Up and Running: Part 1</title>
	<description>In the constant press of rolling out ever better products and services to our customers, it can be easy-- and often necessary-- to fall into a reactive mode around reliability.</description>
	<link>https://www.akamai.com/blog/security/sensor-architecture-can-help-keep-us-up-and-running-part-1</link>
	<author>Kristin Nelson-Patel</author>
	<guid>https://www.akamai.com/blog/security/sensor-architecture-can-help-keep-us-up-and-running-part-1</guid>
	<pubDate>Thu, 04 Mar 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Compromised enterprise devices detection based on abnormal behavior patterns-- UEBA in action</title>
	<description>Recently, many reports of incidents have been making headlines, proving that no business or industry is immune to advanced threat actors. Applying user and entity behavior analytics (UEBA) for the challenging task of the detection of compromised devices over time can play a critical role in enterprises' defense mechanisms.</description>
	<link>https://www.akamai.com/blog/edge/compromised-enterprise-devices-detection-based-on-abnormal-behavior-patterns-ueba-in-action</link>
	<author>Hen Tzaban</author>
	<guid>https://www.akamai.com/blog/edge/compromised-enterprise-devices-detection-based-on-abnormal-behavior-patterns-ueba-in-action</guid>
	<pubDate>Wed, 03 Mar 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Identified as a Leader in DDoS Mitigation by Forrester</title>
	<description>This week, Akamai was again recognized as a Leader in the latest The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021.</description>
	<link>https://www.akamai.com/blog/security/akamai-identified-as-a-leader-in-ddos-mitigation-by-forrester</link>
	<author>Susan McReynolds</author>
	<guid>https://www.akamai.com/blog/security/akamai-identified-as-a-leader-in-ddos-mitigation-by-forrester</guid>
	<pubDate>Wed, 03 Mar 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Better, or More Effective?</title>
	<description>A colleague asked me to share my thoughts on building a "better team". I confess, I stumbled on the word "better". Better than what exactly? </description>
	<link>https://www.akamai.com/blog/security/better-or-more-effective</link>
	<author>Fadi Saba</author>
	<guid>https://www.akamai.com/blog/security/better-or-more-effective</guid>
	<pubDate>Mon, 01 Mar 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai's New ESG Office: A Catalyst for Environmental and Social Progress</title>
	<description>We're proud of the progress Akamai has made in environmental, social, and governance (ESG) performance. </description>
	<link>https://www.akamai.com/blog/culture/akamais-new-esg-office-a-catalyst-for-environmental-and-social-progress</link>
	<author>Aaron Ahola</author>
	<guid>https://www.akamai.com/blog/culture/akamais-new-esg-office-a-catalyst-for-environmental-and-social-progress</guid>
	<pubDate>Thu, 25 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title> Optimizing For Performance, One Hire at a Time: Part 3</title>
	<description>Having previously decided we need to make a new hire onto our team, part 1 of this series examined how to meet the needs of our team going into the future, instead of just adding surface visible technical skills.</description>
	<link>https://www.akamai.com/blog/security/optimizing-for-performance-one-hire-at-a-time-part-3</link>
	<author>Kathryn Kun</author>
	<guid>https://www.akamai.com/blog/security/optimizing-for-performance-one-hire-at-a-time-part-3</guid>
	<pubDate>Thu, 25 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s new in Guardicore Centra R26</title>
	<description>New improvements to Guardicore Centra make it the fastest and simplest solution to protect against ransomware and meet the needs of zero trust.</description>
	<link>https://www.akamai.com/blog/security/centra-update-r26</link>
	<author>Guardicore Labs Team</author>
	<guid>https://www.akamai.com/blog/security/centra-update-r26</guid>
	<pubDate>Wed, 24 Feb 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Bitcoins, Blockchains, and Botnets</title>
	<description>A recent piece of malware from a known crypto mining botnet campaign has started leveraging Bitcoin blockchain transactions in order to hide its backup C2 IP address. It's a simple, yet effective, way to defeat takedown attempts.</description>
	<link>https://www.akamai.com/blog/security/bitcoins--blockchains--and-botnets</link>
	<author>Evyatar Saias</author>
	<guid>https://www.akamai.com/blog/security/bitcoins--blockchains--and-botnets</guid>
	<pubDate>Tue, 23 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Out of My Depth (Where I Belong)</title>
	<description>I remember well my first day as a member of Akamai's InfoSec department.

The Friday prior, I'd just completed the Akamai Technical Academy, a five-month crash-course in all things tech, and was now, on a cold but sunny Monday morning, joining InfoSec for their weekly staff meeting.  Eager to make a good first impression, I took a seat at the large, crowded conference table, opened my notebook, and started to take notes.</description>
	<link>https://www.akamai.com/blog/security/out-of-my-depth-where-i-belong</link>
	<author>Guest Blogger</author>
	<guid>https://www.akamai.com/blog/security/out-of-my-depth-where-i-belong</guid>
	<pubDate>Fri, 19 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Our Role in Inclusion, Diversity, and Engagement </title>
	<description>The work of creating the most inclusive and diverse organization is never-ending. While that may seem daunting to some, I see it as exhilarating. Sure, I say that from the perspective of VP! But at Akamai, Inclusion, Diversity, &amp; Engagement (ID&amp;E) is a set of habits that belong to us all, and it's a commitment we should proudly share.
</description>
	<link>https://www.akamai.com/blog/culture/our-role-in-inclusion-diversity-engagement-by-khalil-smith</link>
	<author>Khalil Smith</author>
	<guid>https://www.akamai.com/blog/culture/our-role-in-inclusion-diversity-engagement-by-khalil-smith</guid>
	<pubDate>Thu, 18 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Can Edge Computing Exist Without the Edge? Part 3: The Economics of Edge Computing</title>
	<description>Do the math. For the past decade, digital businesses have been investing in digital transformation initiatives. The promise is to increase top-line growth while maximizing customer lifetime value. As infrastructure improves, IT spending is shifting from the cloud to the edge. But while edge computing makes headlines, can you expect a meaningful return?</description>
	<link>https://www.akamai.com/blog/edge/can-edge-computing-exist-without-the-edge-part-3-the-economics-of-edge-computing</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/edge/can-edge-computing-exist-without-the-edge-part-3-the-economics-of-edge-computing</guid>
	<pubDate>Thu, 18 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Massive Campaign Targeting UK Banks Bypassing 2FA</title>
	<description>On 14 July, 2020, Oliver Hough, a security researcher from Cyjax, published a report centered on a phishing campaign targeting banking customers in the United Kingdom, which evades two-factor authentication (2FA). </description>
	<link>https://www.akamai.com/blog/security/massive-campaign-targeting-uk-banks-bypassing-2fa</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/massive-campaign-targeting-uk-banks-bypassing-2fa</guid>
	<pubDate>Thu, 18 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>SolarWinds Hack and the Case of DNS Security</title>
	<description>It's not news that some of the top government agencies and companies in the world were victims of the SolarWinds attack. At this point, I can say it's the reason I didn't have a smoother transition back into work-life following a long vacation. As I understand it, the breaches happened after malicious code was inserted into a software patch that was downloaded by the companies and agencies. The installation of the patch executed malicious code, called SUNBURST, which created an entry point for other malicious codes (TEARDROP/RAINDROP). These additional codes were used to allow attackers to move laterally within the network and exfiltrate sensitive customer information to a public command and control server.</description>
	<link>https://www.akamai.com/blog/security/solarwinds-hack-and-the-case-of-dns-security</link>
	<author>Chinedu Egonu</author>
	<guid>https://www.akamai.com/blog/security/solarwinds-hack-and-the-case-of-dns-security</guid>
	<pubDate>Tue, 16 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Credential Stuffing and Account Takeover -- The Business View</title>
	<description>Account takeovers (ATOs), in which criminals impersonate legitimate account owners in order to take control of an account, cause tremendous pain for businesses in all industries. This pain may be monetary, such as losses from stolen accounts, but may also include a number of related problems, like regulatory and legal issues, lost customers, and the inability to gain new consumers due to a lack of trust. Losses from ATOs and new account fraud are estimated at more than $10 billion annually in the United States alone.</description>
	<link>https://www.akamai.com/blog/security/credential-stuffing-and-account-takeovers-the-business-view</link>
	<author>Christine Ferrusi Ross</author>
	<guid>https://www.akamai.com/blog/security/credential-stuffing-and-account-takeovers-the-business-view</guid>
	<pubDate>Thu, 11 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>NHS Vaccine Scams: Criminals Still Targeting COVID-19 Anxiety</title>
	<description>It's 2021, but the anxiety, fear, uncertainty, and stress caused by the COVID-19 pandemic in 2020 is very much alive today.</description>
	<link>https://www.akamai.com/blog/security/nhs-vaccine-scams-criminals-still-targeting-covid-19-anxiety</link>
	<author>Steve Ragan</author>
	<guid>https://www.akamai.com/blog/security/nhs-vaccine-scams-criminals-still-targeting-covid-19-anxiety</guid>
	<pubDate>Thu, 11 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>IPCDump – Guardicore’s New Open-Source Tool for Linux IPC Inspection</title>
	<description>IPCdump allows software based firewall developers, researchers, and linux users to explore the Inter-process-communication (IPC) channels.</description>
	<link>https://www.akamai.com/blog/security/ipcdump-guardicores-new-open-source-tool-for-linux-ipc-inspection</link>
	<author>JJ Lehmann</author>
	<guid>https://www.akamai.com/blog/security/ipcdump-guardicores-new-open-source-tool-for-linux-ipc-inspection</guid>
	<pubDate>Wed, 10 Feb 2021 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Gambling, Social Media, and 10 Years of Streaming the 'Big Game'</title>
	<description>Thanks to the unique perspectives we have via the Akamai Intelligent Edge Platform, we're able to observe massive amounts of web traffic and data that provide insights across the various industries Akamai serves. In the wake of Super Bowl LV, we're sharing some observations on gambling traffic and social media activity, two categories that are complementary to the game. We'll also look at how online viewing has increased over the past 10 years of live streaming the </description>
	<link>https://www.akamai.com/blog/performance/gambling-social-media-and-ten-years-of-super-bowl-streaming</link>
	<author>Chris Nicholson</author>
	<guid>https://www.akamai.com/blog/performance/gambling-social-media-and-ten-years-of-super-bowl-streaming</guid>
	<pubDate>Wed, 10 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Optimizing for Performance, One Hire at a Time: Part 1</title>
	<description>It's a lot of fun to imagine and design the best team.  As managers, it's rare that we get to build a team from the ground up and all at once. </description>
	<link>https://www.akamai.com/blog/security/optimizing-for-performance-one-hire-at-a-time-part-1</link>
	<author>Kathryn Kun</author>
	<guid>https://www.akamai.com/blog/security/optimizing-for-performance-one-hire-at-a-time-part-1</guid>
	<pubDate>Wed, 10 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Krakow Internship</title>
	<description>The beginning of a new year is a time to look back and reflect on the previous one. December 31st is also the end date of our annual Krakow Internship Program. </description>
	<link>https://www.akamai.com/blog/culture/krakow-internship</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/krakow-internship</guid>
	<pubDate>Tue, 09 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Holiday Season Phishing Attacks on the Rise</title>
	<description>Phishing continues to be a major attack vector, and it's surprising just how many security incidents and breaches start with an employee clicking on a link in a carefully crafted phishing email (and sometimes doing the same with a not-so-well crafted phishing email -- see this example).</description>
	<link>https://www.akamai.com/blog/security/phishing-holiday-season-attacks-on-the-rise</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/phishing-holiday-season-attacks-on-the-rise</guid>
	<pubDate>Tue, 09 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Command Injection on a D-Link Router</title>
	<description>During the COVID-19 pandemic, I wanted to extend the local WiFi in my home to reach all the floors. The goal was to have full connectivity from every location in the house.</description>
	<link>https://www.akamai.com/blog/security/command-injection-on-a-d-link-router</link>
	<author>Assaf Vilmovski</author>
	<guid>https://www.akamai.com/blog/security/command-injection-on-a-d-link-router</guid>
	<pubDate>Tue, 09 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Inspiring the Next Generation with DigiGirlz</title>
	<description>DigiGirlz is an initiative organized by Microsoft to engage girls in technological education and careers. The initiative, which launched in 2000, consists of two main programs: DigiGirlz Day and High Tech Camp. This program has been a cornerstone of Microsoft's community engagement for more than 20 years, but this year the events were in jeopardy of being cancelled because of the pandemic. So, what do you do when your passion for helping others meets a challenge? You do what Microsoft does so well -- you innovate!</description>
	<link>https://www.akamai.com/blog/culture/inspiring-the-next-generation-with-digigirlz</link>
	<author>Courtney Hadden</author>
	<guid>https://www.akamai.com/blog/culture/inspiring-the-next-generation-with-digigirlz</guid>
	<pubDate>Mon, 08 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Edge Redirector Cloudlet Gets Faster</title>
	<description>Cloudlets Policy Manager often takes a long time to load, which is a by-product of its original design where every policy activation is an individual file. These files must be moved around the network, and as you might imagine, transferring thousands of files in a multi-tenant network can take a very long time. Add a synchronous API to this problem, and we quickly get into a situation where the Policy Manager UI can freeze until a back-end transfer operation times out.</description>
	<link>https://www.akamai.com/blog/performance/edge-redirector-cloudlet-gets-faster</link>
	<author>Jeffrey Costa</author>
	<guid>https://www.akamai.com/blog/performance/edge-redirector-cloudlet-gets-faster</guid>
	<pubDate>Mon, 08 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai + Fingerbank: How an open source community can transform security</title>
	<description>Isn't it amazing how seemingly simple decisions can have far-reaching effects? When the Inverse team in Montreal took over PacketFence in 2008, it was an open source (OS) solution. </description>
	<link>https://www.akamai.com/blog/news/akamai-fingerbank-how-an-open-source-community-can-transform-security</link>
	<author>Charlie Gero</author>
	<guid>https://www.akamai.com/blog/news/akamai-fingerbank-how-an-open-source-community-can-transform-security</guid>
	<pubDate>Mon, 01 Feb 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>The Importance of Education in Furthering the Sustainability Agenda</title>
	<description>Author: Mark Porter, Director, Supply Chain &amp; International Collaboration, Renewable Energy Buyers Alliance (REBA)

Mark Porter moved to REBA from Rocky Mountain Institute's Business Renewables Center (BRC) initiative in March 2019. Mark continues to support the BRC initiative across all areas and grow REBA's membership. He is developing initiatives to support supply chain engagement and international collaboration between NGOs acting in this space worldwide.</description>
	<link>https://www.akamai.com/blog/culture/the-importance-of-education-in-furthering-the-sustainability-agenda</link>
	<author>Mark Porter</author>
	<guid>https://www.akamai.com/blog/culture/the-importance-of-education-in-furthering-the-sustainability-agenda</guid>
	<pubDate>Fri, 29 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Sustainability Requires Collaboration: Akamai's Growing Community and Supply Chain Initiatives</title>
	<description>Akamai is committed to collaboration that inspires worldwide change. We know it's not enough to be environmentally conscious solely in our own business. To make a true impact on climate change, we need to use our unique position as a global corporation to encourage our partners to join us in taking sustainable action, participating in community improvement projects, and engaging in climate education. We need to consider the question: </description>
	<link>https://www.akamai.com/blog/culture/sustainability-requires-collaboration-akamais-growing-community-and-supply-chain-initiatives</link>
	<author>Courtney Hadden</author>
	<guid>https://www.akamai.com/blog/culture/sustainability-requires-collaboration-akamais-growing-community-and-supply-chain-initiatives</guid>
	<pubDate>Fri, 29 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Our ESG Commitment: Investing in a Better World</title>
	<description>Environmental, social, and governance (ESG) issues are quickly emerging as a key concern for investors. To use a musical analogy, the bow is just resting on the first string, with more notes sure to follow. At Akamai, our ESG instrument is well tuned and ready for the symphony to come, as evidenced by our 2020 Sustainability Report released this week.</description>
	<link>https://www.akamai.com/blog/culture/our-esg-commitment-investing-in-a-better-world</link>
	<author>Aaron Ahola</author>
	<guid>https://www.akamai.com/blog/culture/our-esg-commitment-investing-in-a-better-world</guid>
	<pubDate>Thu, 28 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Distinguishing Among DNS Services Part 3: Investment and Innovation</title>
	<description>This is Part 3 of a 3-part blog series highlighting some of the distinguishing aspects of Akamai's authoritative DNS services, Edge DNS and Global Traffic Management. Part 1 focused on Akamai's DNS platform and what sets it apart. Part 2...</description>
	<link>https://www.akamai.com/blog/performance/distinguishing-among-dns-services-part-3-investment-and-innovation</link>
	<author>Jonathan Zarkower</author>
	<guid>https://www.akamai.com/blog/performance/distinguishing-among-dns-services-part-3-investment-and-innovation</guid>
	<pubDate>Thu, 28 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Working Together with Our Customers to Build a Sustainable Future</title>
	<description>By now, we hope you've read Monday's and Tuesday's blog posts announcing the release of our annual sustainability report, our sustainability program, and the technical innovation behind it.</description>
	<link>https://www.akamai.com/blog/culture/working-together-with-our-customers-to-build-a-sustainable-future</link>
	<author>Natalie Billingham</author>
	<guid>https://www.akamai.com/blog/culture/working-together-with-our-customers-to-build-a-sustainable-future</guid>
	<pubDate>Wed, 27 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>When Destiny is Knocking on Your Door Again - Data Mining CDN Logs to Refine and Optimize Web Attack Detection</title>
	<description>A few years ago, I wrote a blog post trying to explain, with humor, why choosing application security as a career path is destiny derived by my parents calling me "Or", and why a personal name that is a conditional word can sometimes be challenging in daily routines, since some attack payloads contain conditional words.</description>
	<link>https://www.akamai.com/blog/security/when-destiny-is-knocking-on-your-door-again-data-mining-cdn-logs</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/when-destiny-is-knocking-on-your-door-again-data-mining-cdn-logs</guid>
	<pubDate>Wed, 27 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Maintaining an Energy-Efficient Edge Platform</title>
	<description>Over the past 20 years, we've seen a lot of growth at Akamai. When I started at Akamai, we used to have traffic peaks of almost 200 Mbps. From that fledgling startup, Akamai has now grown to such a scale that we almost doubled network capacity in 2020 and were able to serve peaks of almost 200 Tbps. In short, just like the internet, Akamai has undergone quite the evolution. But as we've grown, so have our environmental impacts. In fact, the internet as a whole is responsible for more than 2% of global emissions, having the same impact as the airline industry. Our online streaming, learning, working, shopping, and playing habits have all started to add up. </description>
	<link>https://www.akamai.com/blog/culture/maintaining-an-energy-efficient-edge-platform</link>
	<author>Vinay Kanitkar</author>
	<guid>https://www.akamai.com/blog/culture/maintaining-an-energy-efficient-edge-platform</guid>
	<pubDate>Tue, 26 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Stacking CDNs for Improved Performance and Security</title>
	<description>I recently worked with a client whose large e-commerce site was hosted with a popular cloud-based commerce solution. Its business was growing rapidly into new geographic markets, and it was not satisfied with the embedded content delivery network (eCDN) that was bundled with the cloud solution. We demonstrated that stacking CDNs -- adding Akamai's Ion solution on top of the eCDN -- could significantly improve performance as well as provide the client with much greater control over its delivery configuration</description>
	<link>https://www.akamai.com/blog/performance/stacking-cdns-for-improved-performance-and-security</link>
	<author>Simon Hearne</author>
	<guid>https://www.akamai.com/blog/performance/stacking-cdns-for-improved-performance-and-security</guid>
	<pubDate>Tue, 26 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Retrospective 2020: DDoS Risk Higher Than Ever</title>
	<description>Never before has the risk of a distributed denial-of-service (DDoS) attack been higher. In 2020, we saw record-breaking attacks, a DDoS extortion campaign impacting thousands of organizations globally, more emergency customer turnups, and more Akamai customers attacked than any year on record -- and we've been successfully fighting DDoS attacks since 2003! We also saw a big increase in attacks targeting verticals that haven't seen as much activity of late, with 7 of 11 of the industries we track seeing peak attack counts in 2020.</description>
	<link>https://www.akamai.com/blog/security/part-i-retrospective-2020-ddos-was-back-bigger-and-badder-than-ever-before</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/part-i-retrospective-2020-ddos-was-back-bigger-and-badder-than-ever-before</guid>
	<pubDate>Tue, 26 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>How Client-Side Protection &amp; Compliance Detects Real-World Magecart Attacks</title>
	<description>In this blog, we will take a look at and break down a recent Magecart attack detected and mitigated by Client-Side Protection &amp; Compliance. The impacted customer operates a large international e-commerce business in which one of its websites was compromised with a malicious script.</description>
	<link>https://www.akamai.com/blog/security/how-page-integrity-manager-detects-real-world-magecart-attacks</link>
	<author>Ziv Eli</author>
	<guid>https://www.akamai.com/blog/security/how-page-integrity-manager-detects-real-world-magecart-attacks</guid>
	<pubDate>Tue, 26 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Minecraft Players are Targets Even Off the Network</title>
	<description>When we write the SOTI and talk about attacks against gamers, we spend a good deal of time focusing on network-level events, such as DDoS and credential stuffing.</description>
	<link>https://www.akamai.com/blog/security/minecraft-players-are-targets-even-off-the-network</link>
	<author>Steve Ragan</author>
	<guid>https://www.akamai.com/blog/security/minecraft-players-are-targets-even-off-the-network</guid>
	<pubDate>Tue, 26 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>What happens when your vulnerability is weaponized for botnet proliferation</title>
	<description>This post will focus on the weaponization of a few of the exploits only, as Sarit and Ofir documented everything else.</description>
	<link>https://www.akamai.com/blog/security/what-happens-when-your-vulnerability-is-weaponized-for-botnet-proliferation</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/what-happens-when-your-vulnerability-is-weaponized-for-botnet-proliferation</guid>
	<pubDate>Tue, 26 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Sustainability at Akamai: An Efficient Platform Powered by Energy Aggregation</title>
	<description>If I had a dollar for every time I heard “unprecedented” in 2020, I could fund a clean energy project myself. And while we're tired of hearing this term, it's true amid the pandemic, U.S. presidential election, social justice movements, finalization of Brexit, and many other new and life-changing events that took place this past year.
</description>
	<link>https://www.akamai.com/blog/culture/sustainability-at-akamai-an-efficient-platform-powered-by-energy-aggregation</link>
	<author>Mike Mattera</author>
	<guid>https://www.akamai.com/blog/culture/sustainability-at-akamai-an-efficient-platform-powered-by-energy-aggregation</guid>
	<pubDate>Mon, 25 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Congratulations to 2020 Akamai Partners of the Year</title>
	<description>Last year proved to be a year like no other. We faced unforeseen challenges, including adjusting to a new way of working, collaborating, and conducting business. It is an honor for me to announce the Akamai Partners of the Year for 2020 who went above and beyond in this tumultuous year. These awards recognize Akamai Partner Program (APP) partners that consistently delivered significant sales successes, innovative solution partnerships, and unequaled service levels as they adapted to the new norm of digital transformation.</description>
	<link>https://www.akamai.com/blog/partners/2021/jan/congratulations-to-2020-akamai-partners-of-the-year</link>
	<author>Micheal McCollough</author>
	<guid>https://www.akamai.com/blog/partners/2021/jan/congratulations-to-2020-akamai-partners-of-the-year</guid>
	<pubDate>Mon, 25 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Streaming Traffic Peaks During Biden Inauguration</title>
	<description>Live news streaming traffic during the Biden inauguration ceremony on January 20 peaked at 12 Tbps on the Akamai Intelligent Edge Platform. The peak, which occurred as now-President Biden was taking the oath of office just before 12 PM ET, is roughly 8x higher than what we typically see for mid-day traffic on a weekday. However, it's still less than the 18 Tbps we observed during 2020 election night on November 3.</description>
	<link>https://www.akamai.com/blog/performance/streaming-traffic-peaks-during-biden-inauguration</link>
	<author>Harish Menon</author>
	<guid>https://www.akamai.com/blog/performance/streaming-traffic-peaks-during-biden-inauguration</guid>
	<pubDate>Fri, 22 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>A Place To Belong</title>
	<description>While I've worked for Silicon Valley-based startups and even spent time in the travel tech industry, I'd sometimes feel I was just part of the system. Working each day to earn my keep, and with no bigger purpose than that.</description>
	<link>https://www.akamai.com/blog/culture/a-place-to-belong-by-sheng-thong-hsin</link>
	<author>Thong Hsin Sheng</author>
	<guid>https://www.akamai.com/blog/culture/a-place-to-belong-by-sheng-thong-hsin</guid>
	<pubDate>Wed, 20 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Games Drive Christmas Web Traffic</title>
	<description>If you turned on a new game console and/or downloaded video games over the holidays, you certainly weren't alone. New data from Akamai shows that game-related traffic delivered across our network was more than double the Q4 average on December 25, and up nearly 50% on December 26. During the same period, traffic for all other industries combined was relatively even compared to the rest of the quarter.</description>
	<link>https://www.akamai.com/blog/performance/games-drive-christmas-web-traffic</link>
	<author>Jonathan Singer</author>
	<guid>https://www.akamai.com/blog/performance/games-drive-christmas-web-traffic</guid>
	<pubDate>Wed, 20 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>5 Surprising Cybersecurity Features of Guardicore Centra</title>
	<description>Check out these features around segmentation and visibility that can help working with Guardicore Centra even simpler.</description>
	<link>https://www.akamai.com/blog/security/5-things-you-didnt-know-you-could-do-with-guardicore-centra</link>
	<author>Guardicore Labs Team</author>
	<guid>https://www.akamai.com/blog/security/5-things-you-didnt-know-you-could-do-with-guardicore-centra</guid>
	<pubDate>Tue, 19 Jan 2021 21:15:00 UTC</pubDate>

</item>
<item>
	<title>Guardicore Insight: Adding Best-in-Class Osquery Visibility to Secure Your Workloads</title>
	<description>What if you had a single solution that was able to detect non-compliant and high-risk endpoints and servers, assess their level of exposure, and then immediately secure these servers and endpoints with laser-sharp segmentation policies?</description>
	<link>https://www.akamai.com/blog/security/guardicore-insight-adding-best-in-class-osquery-visibility-to-secure-your-workloads</link>
	<author>Guardicore Labs Team</author>
	<guid>https://www.akamai.com/blog/security/guardicore-insight-adding-best-in-class-osquery-visibility-to-secure-your-workloads</guid>
	<pubDate>Tue, 19 Jan 2021 15:59:00 UTC</pubDate>

</item>
<item>
	<title>Internalship Program</title>
	<description>In today's workplace, the landscape is a fast-paced, competitive environment, and today's employees are frequently on the hunt for growth opportunities. </description>
	<link>https://www.akamai.com/blog/culture/internalship-program-by-kurian-thomas</link>
	<author>Kurian Thomas</author>
	<guid>https://www.akamai.com/blog/culture/internalship-program-by-kurian-thomas</guid>
	<pubDate>Wed, 13 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Emotet: A Year in the Life of a Malware</title>
	<description>Emotet malware has been around since 2014, but 2020 saw a resurgence of attacks. In September 2020, Emotet affected 14% of organizations worldwide. So, what is Emotet? And why is it so dangerous? </description>
	<link>https://www.akamai.com/blog/security/emotet-a-year-in-the-life-of-a-malware</link>
	<author>Jim Black</author>
	<guid>https://www.akamai.com/blog/security/emotet-a-year-in-the-life-of-a-malware</guid>
	<pubDate>Tue, 12 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title> Building a Cross Team Culture</title>
	<description>At Akamai, we all contribute to our diverse, inclusive, and engaged culture. One in which we each have a voice and are empowered to have a meaningful impact on our business and its direction. It's by fostering this culture across teams that we're able to achieve the company's guiding principles. For all of us, it means putting our clients, employees and communities front and center in our daily work.</description>
	<link>https://www.akamai.com/blog/culture/building-a-cross-team-culture-by-rick-mcconnell</link>
	<author>Rick McConnell</author>
	<guid>https://www.akamai.com/blog/culture/building-a-cross-team-culture-by-rick-mcconnell</guid>
	<pubDate>Fri, 08 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Tree-Tracker: Auditing a Log Harvest Using IoT Edge Connect and Node-Red</title>
	<description>At long last, Blue Water Farm is generating revenue! Around 20 acres of our land consists of dense, mature hardwood of oak, maple, and beech, and we were able to contract to sell 65 maple and 25 oak trees to a logging company. I won't be retiring from Akamai any time soon from our logging windfall, but it's nice to see some revenue from our land, and clearing mature trees is a part of good responsible forest management. </description>
	<link>https://www.akamai.com/blog/edge/tree-tracker-auditing-a-log-harvest-using-iot-edge-connect-and-node-red</link>
	<author>Brian Apley</author>
	<guid>https://www.akamai.com/blog/edge/tree-tracker-auditing-a-log-harvest-using-iot-edge-connect-and-node-red</guid>
	<pubDate>Tue, 05 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Keeping Emissions in Check During Unprecedented Internet Use</title>
	<description>As I reflect on 2020 and the way in which the pandemic affected the business world, what stands out to me is the incredible increase in streaming content consumed on the internet. We've seen launches of some of the highest-profile streaming services to date between late 2019 and 2020. People are continuously streaming content and we need to consider the impact that increased viewership is having on the world. When you sit down to catch a movie or binge watch that latest series, do you consider the effect that streamed content has on the rest of the world? We will continue to see an uptick in carbon emissions from the power required to serve online content: servers, network hardware, and the energy needed to keep it all cool. </description>
	<link>https://www.akamai.com/blog/news/keeping-emissions-in-check-during-unprecedented-internet-use</link>
	<author>Mike Mattera</author>
	<guid>https://www.akamai.com/blog/news/keeping-emissions-in-check-during-unprecedented-internet-use</guid>
	<pubDate>Tue, 05 Jan 2021 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai's Technical Enablement and Education Team, Part of the Global Services and Support Organization, Wins 2020 Chief Learning Officer Magazine Gold Award</title>
	<description>On October 2020, the Akamai Technical Enablement and Education (TE&amp;E) Team -- responsible for creating product-training certifications for employees (Global Services and Support [GSS]), customers (Akamai University), and channel partners (Advanced Partner Enablement) -- won its second industry award for program design, functionality, and impact.</description>
	<link>https://www.akamai.com/blog/news/akamais-technical-enablement-and-education-team-part-of-the-global-services-and-support-organization-1</link>
	<author>Andrew Heifetz</author>
	<guid>https://www.akamai.com/blog/news/akamais-technical-enablement-and-education-team-part-of-the-global-services-and-support-organization-1</guid>
	<pubDate>Wed, 30 Dec 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Prolexic and Equinix Cloud Exchange Bring DDoS Defense Closer to the Origin</title>
	<description>In terms of cyberthreats and digital risk, 2020 has been all about distributed denial-of-service (DDoS) attacks. </description>
	<link>https://www.akamai.com/blog/security/akamai-prolexic-and-equinix-cloud-exchange-unite-bringing-ddos-defense-closer-to-the-customer-origin</link>
	<author>Greg Burns</author>
	<guid>https://www.akamai.com/blog/security/akamai-prolexic-and-equinix-cloud-exchange-unite-bringing-ddos-defense-closer-to-the-customer-origin</guid>
	<pubDate>Tue, 29 Dec 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Smart DNS: Emerging Requirements for DNS Encryption</title>
	<description>This blog post -- the fourth in a series --  will discuss how smart DNS resolvers can enhance ongoing ISP and MNO network transformation efforts, such as the transition to 5G, better integration of Wi-Fi, and new network designs that optimize the edge to improve service delivery and network efficiency. </description>
	<link>https://www.akamai.com/blog/edge/smart-dns-for-the-new-network-edge-emerging-requirements-for-dns-encryption</link>
	<author>Bruce Van Nice</author>
	<guid>https://www.akamai.com/blog/edge/smart-dns-for-the-new-network-edge-emerging-requirements-for-dns-encryption</guid>
	<pubDate>Mon, 28 Dec 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title> Research &amp; Academic</title>
	<description>We introduce a novel machine learning approach that uses network flows to generate application-level representation of public and private cloud networks. This will greatly simplify the journey to a micro-segmented network.</description>
	<link>https://www.akamai.com/blog/security/research-academic</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/security/research-academic</guid>
	<pubDate>Wed, 23 Dec 2020 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Launching a New Game Studio and Planning for Growth</title>
	<description>So, you're starting your own game studio. This is an incredible opportunity! You and your team get to start fresh and build the game of your dreams! But, let's be honest, if you have just founded your own game studio, odds are that you're not a technical architect. You may have some technical know-how, but studio founders typically come from the creative side. </description>
	<link>https://www.akamai.com/blog/performance/launching-a-new-game-studio-and-planning-for-growth</link>
	<author>Jonathan Singer</author>
	<guid>https://www.akamai.com/blog/performance/launching-a-new-game-studio-and-planning-for-growth</guid>
	<pubDate>Wed, 23 Dec 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>How the Edge Improves Microservices</title>
	<description>Microservice architecture has transformed the way we develop and operate our applications. Microservices aren't a technology or a programming language. Instead, they create a structure for designing and building applications based on the idea that the individual functions of a website should operate independently. From this simple concept comes a multitude of benefits including:</description>
	<link>https://www.akamai.com/blog/edge/how-the-edge-improves-microservices</link>
	<author>Pavel Despot </author>
	<guid>https://www.akamai.com/blog/edge/how-the-edge-improves-microservices</guid>
	<pubDate>Tue, 22 Dec 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Smart DNS for the New Network: Optimizing Content Delivery</title>
	<description>The presence of public "over the top" DNS resolution alternatives is a strong motivator for ISPs to invest in making their DNS resolution infrastructure the best that it can be. Resolvers are the glue that binds subscribers to their fixed and mobile broadband services. Operators of public DNS services will play a significant role in controlling the user experience and gain goodwill if they succeed in persuading subscribers to use their resolvers. Worse, when public DNS services fail, it's probable that subscribers will blame their service provider because they may not understand the critical role DNS plays, or may not even remember they switched their DNS settings!
</description>
	<link>https://www.akamai.com/blog/security/smart-dns-for-the-new-network-optimizing-content-delivery</link>
	<author>Bruce Van Nice</author>
	<guid>https://www.akamai.com/blog/security/smart-dns-for-the-new-network-optimizing-content-delivery</guid>
	<pubDate>Thu, 17 Dec 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Stopping Active Attacks with Penalty Box</title>
	<description>Unfortunately, today's sophisticated web application threats have gained some advantages over typical WAFs: Favorable odds -- WAFs must correctly identify attacks 100% of the time, whereas attackers have the luxury of only needing to find a single bypass or evasion Temporary fixes -- Many WAFs use a "whack-a-mole" response tactic by only denying the individual attack request, allowing the attacker to make repeated attempts Persistence -- If left unimpeded, attackers may eventually find some type of payload obfuscation that minimizes detection effectiveness
The confluence of these advantages should concern WAF customers. Let's take a closer look at the typical web attacker methodology to see why.</description>
	<link>https://www.akamai.com/blog/security/penalty-box</link>
	<author>Ryan Barnett</author>
	<guid>https://www.akamai.com/blog/security/penalty-box</guid>
	<pubDate>Tue, 15 Dec 2020 19:26:00 UTC</pubDate>

</item>
<item>
	<title>Smart DNS: Delivering the Best Subscriber Experience</title>
	<description>The presence of public "over-the-top" DNS resolution alternatives is a strong motivator for internet service providers (ISPs) to invest in making their DNS resolution infrastructure the best that it can be. Resolvers are the glue that binds subscribers to their fixed and mobile broadband services. </description>
	<link>https://www.akamai.com/blog/performance/smart-dns-delivering-the-best-subscriber-experience</link>
	<author>Bruce Van Nice</author>
	<guid>https://www.akamai.com/blog/performance/smart-dns-delivering-the-best-subscriber-experience</guid>
	<pubDate>Thu, 10 Dec 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Cyberweek 2020 Attracted Both Online Shoppers and DDoS Attackers</title>
	<description>2020 has shown both record-busting bps and pps attacks and the most prolific DDoS extortion campaign recorded by Akamai.</description>
	<link>https://www.akamai.com/blog/security/cyberweek-2020-attracted-both-online-shoppers-and-ddos-attackers</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/cyberweek-2020-attracted-both-online-shoppers-and-ddos-attackers</guid>
	<pubDate>Wed, 09 Dec 2020 16:03:00 UTC</pubDate>

</item>
<item>
	<title>Evading Link Scanning Security Services with Passive Fingerprinting</title>
	<description>By Gal Bitensky, Executive Summary Link scanners are a critical component in multiple classes of security products including email security suites, websites that suggest direct inspection of a suspicious link, and others. Behind the scenes, these services use web clients...</description>
	<link>https://www.akamai.com/blog/security/evading-link-scanning-security-services-with-passive-fingerprinting</link>
	<author>Gal Bitensky</author>
	<guid>https://www.akamai.com/blog/security/evading-link-scanning-security-services-with-passive-fingerprinting</guid>
	<pubDate>Wed, 09 Dec 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Can Edge Computing Exist Without the Edge? Part 2: Edge Computing</title>
	<description>In part 1 of this series, I drew the architectural distinction between a centralized cloud platform and a distributed edge network. This is an important foundation upon which to explain the difference between cloud computing and edge computing. The two serve very different and complementary purposes. However, in my experience, business leaders, product owners, and application developers often mistake them as competitive.</description>
	<link>https://www.akamai.com/blog/edge/can-edge-computing-exist-without-the-edge-part-2-edge-computing</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/edge/can-edge-computing-exist-without-the-edge-part-2-edge-computing</guid>
	<pubDate>Tue, 08 Dec 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Phishing Summary 2020—Trends and Highlights</title>
	<description>2020 was a challenging year for many of us, as the COVID-19 pandemic disrupted life and introduced challenges in almost all elements of living. 2020 was also challenging from a cybersecurity point of view, as nearly the entire workforce moved...</description>
	<link>https://www.akamai.com/blog/security/phishing-summary-2020-trends-and-highlights</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/phishing-summary-2020-trends-and-highlights</guid>
	<pubDate>Tue, 08 Dec 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title> Distinguishing Among DNS Services Part 2: The Economics</title>
	<description>This is Part 2 of a three-part blog series highlighting some of the distinguishing aspects of Akamai's Domain Name System (DNS) services, Edge DNS and Global Traffic Management. </description>
	<link>https://www.akamai.com/blog/trends/distinguishing-among-dns-services-part-2-the-economics</link>
	<author>Jonathan Zarkower</author>
	<guid>https://www.akamai.com/blog/trends/distinguishing-among-dns-services-part-2-the-economics</guid>
	<pubDate>Mon, 07 Dec 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Distinguishing Among DNS Services Part 2: The Economics</title>
	<description>This is Part 2 of a 3-part blog series highlighting some of the distinguishing aspects of Akamai's DNS services, Edge DNS and Global Traffic Management.</description>
	<link>https://www.akamai.com/blog/trends/digital-transformation-distinguishing-among-dns-services-part-2</link>
	<author>Jonathan Zarkower</author>
	<guid>https://www.akamai.com/blog/trends/digital-transformation-distinguishing-among-dns-services-part-2</guid>
	<pubDate>Mon, 07 Dec 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Distinguishing Among DNS Services Part 1: The Platform</title>
	<description>This is Part 1 of a 3-part blog series highlighting some of the distinguishing aspects of Akamai's DNS services, Edge DNS and Global Traffic Management.</description>
	<link>https://www.akamai.com/blog/trends/distinguishing-among-dns-services-part-1-the-platform</link>
	<author>Jonathan Zarkower</author>
	<guid>https://www.akamai.com/blog/trends/distinguishing-among-dns-services-part-1-the-platform</guid>
	<pubDate>Mon, 30 Nov 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title> Using LL-HLS with Byte-Range Addressing to Achieve Interoperability in Low Latency Streaming</title>
	<description>HTTP Adaptive Segmented (HAS) streaming began to be used at scale from 2008 to 2012, with the advent of Move Networks, Microsoft Smooth Streaming, Apple HLS, Adobe HDS, and MPEG DASH. With the typical 10s segment durations of the day, livestream latencies (measuring latency as the time from an action being filmed to that same action being displayed on a device's screen) remained in the 30s to 60s range, trailing broadcast by a significant degree.</description>
	<link>https://www.akamai.com/blog/performance/-using-ll-hls-with-byte-range-addressing-to-achieve-interoperabi</link>
	<author>Will Law</author>
	<guid>https://www.akamai.com/blog/performance/-using-ll-hls-with-byte-range-addressing-to-achieve-interoperabi</guid>
	<pubDate>Mon, 23 Nov 2020 08:00:00 UTC</pubDate>

</item>
<item>
	<title>Don't Let DDoS Extortionists Deliver a KO Punch</title>
	<description>Since mid-August, a variety of threat actors (and copycats alike) have been targeting organizations across all industries globally, threatening impending DDoS attacks unless Bitcoin is paid out. It's apparent, as the campaign rages on, that some businesses must be paying the extortion demands, -- incentivizing the criminal activity. Others are procuring emergency DDoS defenses in order to withstand bandwidth-busting attacks and keep internet-facing infrastructure protected. As highlighted in our last blog, we've been busy ramping customers on to our DDoS mitigation platforms for rapid protection before the threat actors strike again. And based on recent activity, they desire a rematch.</description>
	<link>https://www.akamai.com/blog/security/don-t-let-ddos-extortionists-deliver-a-ko-punch</link>
	<author>Susan McReynolds</author>
	<guid>https://www.akamai.com/blog/security/don-t-let-ddos-extortionists-deliver-a-ko-punch</guid>
	<pubDate>Fri, 20 Nov 2020 19:14:00 UTC</pubDate>

</item>
<item>
	<title>WordPress Malware Setting Up SEO Shops</title>
	<description>While recently looking over my honeypots, I discovered an infection where a malicious actor added a storefront on top of my existing WordPress installation. For background, this particular honeypot is a full instance of WordPress running on a Docker image....</description>
	<link>https://www.akamai.com/blog/security/wordpress-malware-setting-up-seo-shops</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/wordpress-malware-setting-up-seo-shops</guid>
	<pubDate>Fri, 20 Nov 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Toward Inclusive Language in Software</title>
	<description></description>
	<link>https://www.akamai.com/blog/culture/toward-inclusive-language-in-software</link>
	<author>Erik Nygren</author>
	<guid>https://www.akamai.com/blog/culture/toward-inclusive-language-in-software</guid>
	<pubDate>Wed, 18 Nov 2020 17:30:00 UTC</pubDate>

</item>
<item>
	<title>The dangers of firewall misconfigurations</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/the-dangers-of-firewall-misconfigurations-and-how-to-avoid-them</link>
	<author>Dave Burton</author>
	<guid>https://www.akamai.com/blog/security/the-dangers-of-firewall-misconfigurations-and-how-to-avoid-them</guid>
	<pubDate>Mon, 16 Nov 2020 20:27:00 UTC</pubDate>

</item>
<item>
	<title>Safeguard Identity Data at the Source</title>
	<description>When your customers create an account on your website or application, they are entrusting their valuable information with you in order to establish a relationship. To maintain that relationship, they need to have faith that you will protect their information.</description>
	<link>https://www.akamai.com/blog/security/safeguard-identity-data-at-the-source</link>
	<author> Megan Freshley</author>
	<guid>https://www.akamai.com/blog/security/safeguard-identity-data-at-the-source</guid>
	<pubDate>Mon, 16 Nov 2020 14:00:00 UTC</pubDate>

</item>
<item>
	<title> Akamai Wellness in APJ</title>
	<description>Creating the world's best and most secure digital experience demands the very best industry talent. But as a responsible employer, we also understand how important it is to play our part in looking after those brilliant minds.</description>
	<link>https://www.akamai.com/blog/culture/akamai-wellness-in-apj</link>
	<author>Lily Nguyen</author>
	<guid>https://www.akamai.com/blog/culture/akamai-wellness-in-apj</guid>
	<pubDate>Fri, 13 Nov 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Redundant, Secure, and Open Short Domains: A Vision for Multi-Provider Apex Domain Aliases to Enable DNS Diversity</title>
	<description>Human nature is to seek simpler and convenient ways to do things. One example is the sometimes onerous task of typing a URL into a web browser's address bar. Since users prefer short, easy-to-remember URLs, an internet trend is to use short domains for websites (e.g., edgedns.zone). With short website names, users benefit from the convenience of fewer characters to remember and type.</description>
	<link>https://www.akamai.com/blog/security/redundant--secure--and-open-short-domains--a-vision-for-multi-pr</link>
	<author>Jim Gilbert</author>
	<guid>https://www.akamai.com/blog/security/redundant--secure--and-open-short-domains--a-vision-for-multi-pr</guid>
	<pubDate>Wed, 11 Nov 2020 16:44:00 UTC</pubDate>

</item>
<item>
	<title>A New Skimmer Uses WebSockets and a Fake Credit Card Form to Steal Sensitive Data</title>
	<description>A new skimmer attack was discovered this week, targeting various online e-commerce sites built with different frameworks. As I write this blog post, the attack is still active and exfiltrating data.
</description>
	<link>https://www.akamai.com/blog/security/a-new-skimmer-uses-websockets-and-a-fake-credit-card-form-to-steal-sensitive-data</link>
	<author>Gal Meiri</author>
	<guid>https://www.akamai.com/blog/security/a-new-skimmer-uses-websockets-and-a-fake-credit-card-form-to-steal-sensitive-data</guid>
	<pubDate>Tue, 10 Nov 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>My Path to Akamai</title>
	<description>Three years ago, I graduated with a bachelor's degree in Electronic Engineering (Mechatronic) from University Tun Hussein Onn Malaysia. I was to be an engineer in the oil and gas industry - but the universe had a better plan for me. Instead, I stepped into IT, providing Technical Support despite my lack of knowledge. I was struggling! But it was there that I found my passion.</description>
	<link>https://www.akamai.com/blog/culture/my-path-to-akamai-by-amirah-zahidah-binti-onn</link>
	<author>Amirah Zahidah binti Onn</author>
	<guid>https://www.akamai.com/blog/culture/my-path-to-akamai-by-amirah-zahidah-binti-onn</guid>
	<pubDate>Thu, 05 Nov 2020 08:00:00 UTC</pubDate>

</item>
<item>
	<title>Phishing JavaScript Obfuscation Techniques Soars  </title>
	<description>In our previous blogs, first where we explained JavaScript Obfuscation techniques and introduced a detailed overview on how JavaScript is being used to obfuscate page content to make phishing attacks and other web scams as evasive as possible; followed by one where we took a deep dive to examine double JavaScript obfuscation techniques, presenting a tale of an obfuscated scam seen in the wild and showing how the same phishing campaign is using numerous obfuscation techniques in an attempt to remain hidden.</description>
	<link>https://www.akamai.com/blog/security/phishing-javascript-obfuscation-techniques-soars</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/phishing-javascript-obfuscation-techniques-soars</guid>
	<pubDate>Fri, 30 Oct 2020 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Onboarding During A Pandemic: Can It Really Work? New Joiner, Lily Nguyen, Shares Her Experience.</title>
	<description>I recently joined the Sales Development APAC team, looking after the Vietnam, Thailand and Hong Kong markets. I'd already had a great impression of Akamai's culture from my interview rounds. But how would the onboarding work? I'd been looking forward to meeting new colleagues in an office environment. I wanted to feel part of a new team; that sense of collaboration you get from personal interaction. Instead, I only got to meet our IT guy outside the office who presented me with my MacBook Pro. </description>
	<link>https://www.akamai.com/blog/culture/onboarding-during-a-pandemic-can-it-really-work-new-joiner-lily-nguyen</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/onboarding-during-a-pandemic-can-it-really-work-new-joiner-lily-nguyen</guid>
	<pubDate>Fri, 30 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>The Tale of Double JavaScript Obfuscated Scam</title>
	<description>The phishing landscape is constantly evolving. Over the years, it has evolved into a more scalable threat, with an overwhelming amount of campaigns being launched daily. Phishing also changed when criminals started adding more capabilities and features to their toolkits, which make the phishing websites long lived and difficult to detect.</description>
	<link>https://www.akamai.com/blog/security/the-tale-of-double-javascript-obfuscated-scam</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/the-tale-of-double-javascript-obfuscated-scam</guid>
	<pubDate>Thu, 29 Oct 2020 01:02:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Edge Cloud: Scaling IoT, Part 2</title>
	<description>IoT has tremendous possibilities to transform our world but will fall short of expectations if the underlying infrastructure cannot support the rapid exchange of massive amounts of information from billions of simultaneous and intermittent connections. Akamai Edge Cloud is designed to enable the potential of IoT by utilizing the deep knowledge we've gained operating one of the world's largest edge networks.</description>
	<link>https://www.akamai.com/blog/developers/akamai-edge-cloud--scaling-iot--part-2</link>
	<author>Michael Archer</author>
	<guid>https://www.akamai.com/blog/developers/akamai-edge-cloud--scaling-iot--part-2</guid>
	<pubDate>Tue, 27 Oct 2020 15:00:00 UTC</pubDate>

</item>
<item>
	<title>ATA 8.0 Graduation Ceremony</title>
	<description>Akamai Technical Academy is a training program designed for people who have an interest and aptitude for technology but may not come from a traditional technical background. Up until now, we have successfully onboarded over 140 incredible people in three Akamai locations: Cambridge (MA, US), San Jose (Costa Rica) and Krakow (Poland). 
</description>
	<link>https://www.akamai.com/blog/culture/ata-8-0-graduation-ceremony-by-magda-bukala</link>
	<author>Magda Bukala</author>
	<guid>https://www.akamai.com/blog/culture/ata-8-0-graduation-ceremony-by-magda-bukala</guid>
	<pubDate>Tue, 27 Oct 2020 07:00:00 UTC</pubDate>

</item>
<item>
	<title>5G, Security, IoT, Asavie, and Akamai</title>
	<description>Malicious actors never rest and have always worked remotely. That simple realization hit home during recent global events. Specifically, Akamai saw an increase in malware traffic of over 400% between March 9 and May 11, 2020 from corporate devices, most of which were being used outside of a traditional office environment.</description>
	<link>https://www.akamai.com/blog/news/5g-security-iot-asavie-and-akamai</link>
	<author>Adam Karon</author>
	<guid>https://www.akamai.com/blog/news/5g-security-iot-asavie-and-akamai</guid>
	<pubDate>Tue, 27 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Catch Me if You Can—JavaScript Obfuscation</title>
	<description>While conducting threat research on phishing evasion techniques, Akamai came across threat actors using obfuscation and encryption, making the malicious page harder to detect. The criminals were using JavaScript to pull this off....</description>
	<link>https://www.akamai.com/blog/security/catch-me-if-you-can-javascript-obfuscation</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/catch-me-if-you-can-javascript-obfuscation</guid>
	<pubDate>Mon, 26 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>2020 DDoS Extortion Campaign -- A Sequel More Thrilling Than the Original</title>
	<description>As the go-to enterprise distributed denial-of-service (DDoS) mitigation experts, our phones have been "ringing off the hook" since the release of the global extortion DDoS campaign sequel. This latest installment of the cybersecurity saga is bigger, badder, and features a broader cast of criminal characters than seen previously with last year's extortion-related activity.</description>
	<link>https://www.akamai.com/blog/security/2020-ddos-extortion-campaign-a-sequel-more-thrilling-than-the-original</link>
	<author>Susan McReynolds</author>
	<guid>https://www.akamai.com/blog/security/2020-ddos-extortion-campaign-a-sequel-more-thrilling-than-the-original</guid>
	<pubDate>Tue, 20 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Can Edge Computing Exist Without the Edge? Part 1: The Edge</title>
	<description>If the title sounds like a trick question, it really depends on who you ask. Semantically, it seems clear that if you take the "edge" and combine it with "computing" you get edge computing. But if you have been reading headlines, you would be justified in having doubts that the answer is that simple.</description>
	<link>https://www.akamai.com/blog/edge/can-edge-computing-exist-without-the-edge-part-1-the-edge</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/edge/can-edge-computing-exist-without-the-edge-part-1-the-edge</guid>
	<pubDate>Mon, 19 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>DDoS Extortion Examination</title>
	<description>In terms of the Distributed Denial of Service (DDoS) landscape, 2020 was almost boring prior to the beginning of August. The excitement from the record peak Gbps and Mpps seen in early summer had worn off, and we weren't seeing...</description>
	<link>https://www.akamai.com/blog/security/ddos-extortion-examination</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/ddos-extortion-examination</guid>
	<pubDate>Fri, 16 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Why Take It to the Edge</title>
	<description>Edge computing is the next natural paradigm shift in IT, bringing a new wave of decentralization. Over the past decade, IT has embraced two seemingly juxtaposed trends: the consolidation of infrastructure and data in private, public, or hybrid clouds, and the growing distribution and diversity of devices that access them. How can these trends continue to coexist? The answer is at the edge.</description>
	<link>https://www.akamai.com/blog/news/why-take-it-to-the-edge</link>
	<author>Lelah Manz</author>
	<guid>https://www.akamai.com/blog/news/why-take-it-to-the-edge</guid>
	<pubDate>Thu, 15 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>What's New in Security (Part 2)</title>
	<description>Welcome to the Akamai Platform Update! 
We're presenting an entire week of learning about Akamai's recent product updates. Each day, we'll highlight our latest innovations in each area of the Akamai Intelligent Platform.</description>
	<link>https://www.akamai.com/blog/security/whats-new-in-security-part-2</link>
	<author>Lorenz Jakober</author>
	<guid>https://www.akamai.com/blog/security/whats-new-in-security-part-2</guid>
	<pubDate>Wed, 14 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Latinex Month and Our Culture </title>
	<description>Eleven months ago, I joined Akamai as a result of the acquisition of a company I was partner of. The former company was small compared to Akamai, but had operations in several countries in the region, from Argentina to Mexico. In this company, we had been working with Akamai for 17 years, but on November 1, 2019, we officially became a part of the family.</description>
	<link>https://www.akamai.com/blog/culture/latinex-month-and-our-culture-by-claudio-baumann</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/latinex-month-and-our-culture-by-claudio-baumann</guid>
	<pubDate>Tue, 13 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>API Discovery and Profiling -- Visibility to Protection</title>
	<description>APIs have become a dominant mechanism in the modern web, allowing organizations to create powerful web and mobile experiences, while exposing back-end data and logic to create new and innovative offerings.</description>
	<link>https://www.akamai.com/blog/security/api-discovery-and-profiling-visibility-to-protection</link>
	<author>Amol Mathur</author>
	<guid>https://www.akamai.com/blog/security/api-discovery-and-profiling-visibility-to-protection</guid>
	<pubDate>Tue, 13 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>What's New in Web Security</title>
	<description>With Akamai's web security portfolio, the top focus this October is on the web application firewall (WAF), with exciting new capabilities: API Discovery and Adaptive Security Profiles.</description>
	<link>https://www.akamai.com/blog/security/whats-new-in-web-security</link>
	<author>Renny Shen</author>
	<guid>https://www.akamai.com/blog/security/whats-new-in-web-security</guid>
	<pubDate>Tue, 13 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Be Resilient to Data Theft</title>
	<description>Page Integrity Manager is now PCI compliant -- a strong starting point to harden your web applications</description>
	<link>https://www.akamai.com/blog/trends/how-to-be-resilient-to-data-theft</link>
	<author>Gerhard Giese</author>
	<guid>https://www.akamai.com/blog/trends/how-to-be-resilient-to-data-theft</guid>
	<pubDate>Tue, 13 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Visualize Visitor Prioritization in Real Time with mPulse</title>
	<description>The internet has become one of the most important access points in our daily lives. Unexpected surges in demand can slow web pages and create service outages for unprepared websites. A poor user experience leads to dissatisfied customers, making it more critical than ever to visualize and control online performance.
</description>
	<link>https://www.akamai.com/blog/security/visualize-visitor-prioritization-in-real-time-with-mpulse</link>
	<author>Hitoshi Kaneko</author>
	<guid>https://www.akamai.com/blog/security/visualize-visitor-prioritization-in-real-time-with-mpulse</guid>
	<pubDate>Mon, 12 Oct 2020 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Preparing the Edge for a Big Year in Live Streaming</title>
	<description>Next year is shaping up to be a big one for live streaming. Typically characteristic of even years, when many major international sporting events take place, 2021 looks like it could defy the trend. Akamai is predicting an unprecedented surge in live streaming that will start in late 2020 and continue throughout 2021. During this stretch, we could realistically see 50 million people concurrently streaming a single live event. That's roughly double the largest number of viewers we've seen during a single event in the past. With this in mind, Akamai has used much of 2020 to prepare new capabilities included in the Akamai Platform Update that will help customers prepare for this surge in live streaming.</description>
	<link>https://www.akamai.com/blog/edge/preparing-the-edge-for-a-big-year-in-live-streaming</link>
	<author>Alex Balford</author>
	<guid>https://www.akamai.com/blog/edge/preparing-the-edge-for-a-big-year-in-live-streaming</guid>
	<pubDate>Mon, 12 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Three Cloud-First Akamai Initiatives for Your Cloud Journey</title>
	<description>According to a 2020 State of the Cloud Report, 61% of organizations plan to focus on cloud migration this year and 93% have a multi-cloud strategy. This means that on average your organization is using 2.2 public clouds, multiplying your complexity and costs.</description>
	<link>https://www.akamai.com/blog/news/three-cloud-first-akamai-initiatives-to-support-your-cloud-journey</link>
	<author>CJ Arnesen</author>
	<guid>https://www.akamai.com/blog/news/three-cloud-first-akamai-initiatives-to-support-your-cloud-journey</guid>
	<pubDate>Mon, 12 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Timers, Metrics, and Dimensions: What's New for mPulse in 2020</title>
	<description>The October 2020 release marks the culmination of a large number of updates to mPulse, Akamai's real user monitoring (RUM) solution:</description>
	<link>https://www.akamai.com/blog/performance/timers-metrics-and-dimensions-whats-new-in-mpulse-in-2020</link>
	<author>Simon Hearne</author>
	<guid>https://www.akamai.com/blog/performance/timers-metrics-and-dimensions-whats-new-in-mpulse-in-2020</guid>
	<pubDate>Mon, 12 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>What's New in Edge Delivery</title>
	<description>Welcome to day two of the Akamai Platform Update! 
Today, we're focusing on Akamai's edge delivery products as well as other complimentary products that help drive great digital experiences. The last several months have been nothing short of unprecedented as lockdowns, quarantines, and other protective measures enacted by governments and organizations drove a sudden and dramatic shift in user behavior, which in turn has driven enormous traffic levels. Akamai's importance has never been more evident as companies continue to rely on the intelligent edge platform to maintain business continuity and support the unprecedented traffic demand from online audiences. Regardless of the type of content, be it websites, apps, APIs, video, software, or smaller objects, Akamai's comprehensive set of content delivery products -- including Ion, Adaptive Media Delivery, and Download Delivery -- are designed to deliver great digital experiences for every user, regardless of location, device, or network.</description>
	<link>https://www.akamai.com/blog/performance/whats-new-in-delivery</link>
	<author>Alex Balford</author>
	<guid>https://www.akamai.com/blog/performance/whats-new-in-delivery</guid>
	<pubDate>Mon, 12 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Measuring and Improving Core Web Vitals</title>
	<description>Google recently announced a proposed update to its search ranking algorithm: the Page Experience Update. This change, which launches in 2021, includes more performance signals in the ranking algorithm. A subtle but important feature of the update is that AMP will no longer be a requirement for promotion to Top Stories -- fast pages are all you need!</description>
	<link>https://www.akamai.com/blog/performance/measuring-improving-core-web-vitals</link>
	<author>Simon Hearne</author>
	<guid>https://www.akamai.com/blog/performance/measuring-improving-core-web-vitals</guid>
	<pubDate>Mon, 12 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Edgeworkers Use Story: Creating High-Performing, Individualized Campaign Responses in Online Retail</title>
	<description>As campaigns and digital experiences become more individualized, they can create a challenge for delivering content to consumers at the highest velocity. Having each paid search, social media, and email marketing campaign add unique query string parameters to requests is critical for tracking the ROI of a company's marketing spend. This pursuit of granular user data can place a stubborn limit on the ability of B2C companies to maximize the benefits of cached content -- particularly in terms of maximizing offload of content delivery.</description>
	<link>https://www.akamai.com/blog/developers/edgeworkers-use-story-creating-high-performing-individualized-campaign-responses</link>
	<author>Gregory Griffiths</author>
	<guid>https://www.akamai.com/blog/developers/edgeworkers-use-story-creating-high-performing-individualized-campaign-responses</guid>
	<pubDate>Sun, 11 Oct 2020 21:00:00 UTC</pubDate>

</item>
<item>
	<title>Computing at the Edge</title>
	<description>Welcome to the Akamai October 2020 Update - a week of product updates, new features, and innovations. We'll be highlighting a different area of our portfolio each day this week. In today's post, we look at our enhanced edge computing capabilities and how they help developers more effectively and rapidly improve customer experiences on the Akamai platform.</description>
	<link>https://www.akamai.com/blog/edge/computing-at-the-edge</link>
	<author>Gregory Griffiths</author>
	<guid>https://www.akamai.com/blog/edge/computing-at-the-edge</guid>
	<pubDate>Sun, 11 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>WarezTheRemote: Turning Remotes into Listening Devices</title>
	<description>Television remotes have gotten little attention as a potential attack vector – despite being one of the most common household devices you can find.</description>
	<link>https://www.akamai.com/blog/security/wareztheremote-turning-remotes-into-listening-devices</link>
	<author>JJ Lehmann</author>
	<guid>https://www.akamai.com/blog/security/wareztheremote-turning-remotes-into-listening-devices</guid>
	<pubDate>Wed, 07 Oct 2020 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Death by a Thousand Cuts: Nuisance DDoS Attacks in the Games Industry</title>
	<description>At Akamai, we talk a lot about DDoS attacks. It's because we're pretty good at handling them. We've stopped many of the world's biggest attacks. And, while less common, they get a lot of attention. But we can also stop the world's smallest attacks. And we stop lots of them. It's these smaller attacks that we're talking about today.</description>
	<link>https://www.akamai.com/blog/security/death-by-a-thousand-cuts-nuisance-ddos-attacks-in-the-games-industry</link>
	<author>Jonathan Singer</author>
	<guid>https://www.akamai.com/blog/security/death-by-a-thousand-cuts-nuisance-ddos-attacks-in-the-games-industry</guid>
	<pubDate>Wed, 07 Oct 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>My Journey to Akamai and Back</title>
	<description>As a region, it's very diverse and dynamic, with a lot to experience. Although I'm based in the Beijing office, I have opportunities to collaborate closely with my colleagues in Japan, India, Singapore and Australia. We find synergies and uniqueness in each market, and constantly share ideas and best practices. It's fun, but it's also an enriching learning experience to live and work in such an exciting region. 
</description>
	<link>https://www.akamai.com/blog/culture/my-journey-to-akamai-and-back-wentao-li-senior-technical</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/my-journey-to-akamai-and-back-wentao-li-senior-technical</guid>
	<pubDate>Thu, 24 Sep 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Smart DNS for the New Network Edge</title>
	<description>People depend on the internet for just about everything: interacting, learning, transacting, traveling, working, and more. At the same time, the wireless evolution to 4G -- and soon 5G and Wi-Fi everywhere -- has given birth to an era of connected cars, smart sensors, and a multitude of other "things" that are growing rapidly and expanding in utility and scope. Leading network providers see new market opportunities with new business models to monetize new services that combine networks and commerce, including:</description>
	<link>https://www.akamai.com/blog/performance/smart-dns-for-the-new-network-edge</link>
	<author>Bruce Van Nice</author>
	<guid>https://www.akamai.com/blog/performance/smart-dns-for-the-new-network-edge</guid>
	<pubDate>Tue, 22 Sep 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Start Growing and Never Stop</title>
	<description>My heritage is Sri Lankan. But, at the age of 15 I moved to France as a refugee, fleeing a civil war. Starting a new life from scratch in France, without speaking French, was certainly an interesting journey. But I was lucky enough to have support from my parents. They lived by the mantra of "when there's a will, there's a way". And that helped get me into the French education system, where I completed high school and University, before moving to the UK to start my professional career in IT. 
</description>
	<link>https://www.akamai.com/blog/culture/how-to-start-growing-and-never-stop-gobi-tarmat-director</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/how-to-start-growing-and-never-stop-gobi-tarmat-director</guid>
	<pubDate>Mon, 21 Sep 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Headwinds and Tailwinds - Cycling For Climate Awareness in a Global Pandemic</title>
	<description>If you told me at the beginning of 2020 that I'd be cycling 250 miles in the remote Upper Peninsula of Michigan, fundraising for an organization called "Climate Ride", and wearing a face mask to go grocery shopping - I would not have believed you.  Yet, since March 2020, we've all been living the reality of the Covid-19 pandemic. Social distancing, total lock-down for some, living and working from home, and dealing with a narrowed life experience. </description>
	<link>https://www.akamai.com/blog/culture/headwinds-and-tailwinds-cycling-for-climate-awareness-in-a-global-pandemic</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/headwinds-and-tailwinds-cycling-for-climate-awareness-in-a-global-pandemic</guid>
	<pubDate>Tue, 15 Sep 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>When Hackers Take Advantage of Your Trusted Vendors</title>
	<description>As JavaScript-based client-side attacks continue to evolve, we see how attackers are getting more sophisticated and employing more advanced techniques. Unfortunately, it has been proven many times that any website partner can be exploited to carry out an attack. In the past month, we witnessed one of the most popular and trusted vendors being used as a credit card data exfiltration vector -- Google Analytics.</description>
	<link>https://www.akamai.com/blog/security/when-hackers-take-advantage-of-your-trusted-vendors</link>
	<author>Ziv Eli</author>
	<guid>https://www.akamai.com/blog/security/when-hackers-take-advantage-of-your-trusted-vendors</guid>
	<pubDate>Fri, 11 Sep 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Unprecedented Levels of Ransom DDoS Extortion Attacks</title>
	<description>The FBI has released a flash warning that thousands of organizations around the world, and across multiple industries, have been threatened with DDoS attacks unless they pay a bitcoin ransom. This ransom DDoS, or RDoS, threat was covered by Akamai's Security Intelligence Response Team (SIRT) in a Security Alert released on August 17, 2020. </description>
	<link>https://www.akamai.com/blog/trends/unprecedented-levels-of-ransom-ddos-extortion-attacks</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/trends/unprecedented-levels-of-ransom-ddos-extortion-attacks</guid>
	<pubDate>Fri, 11 Sep 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Web Application and API Protection: From SQL Injection to Magecart</title>
	<description>SQL injections were first discovered in 1998, and over 20 years later, they remain an unsolved challenge and an ongoing threat for every web application and API. The Open Web Application Security Project (OWASP) highlighted injection flaws in its Top 10 lists for both web application security risks and API security threats. </description>
	<link>https://www.akamai.com/blog/security/web-application-and-api-protection-from-sql-injection-to-magecart</link>
	<author>Renny Shen</author>
	<guid>https://www.akamai.com/blog/security/web-application-and-api-protection-from-sql-injection-to-magecart</guid>
	<pubDate>Wed, 09 Sep 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Every Application Should Be Behind a WAF</title>
	<description>It's no secret that security threats continue to expand in volume and variety, making headlines on virtually a daily basis. From nation-state attacks, corporate espionage, and data exfiltration campaigns to all-in-one and sneaker bot campaigns, businesses across the globe find themselves dealing with a deluge of inbound threats. The increased amount and variation of threats, and the proliferation of apps being deployed and managed by teams and individuals across the enterprise, can make securing apps and data feel like trying to keep water out of a submerged sieve.</description>
	<link>https://www.akamai.com/blog/security/every-application-should-be-behind-a-waf</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/security/every-application-should-be-behind-a-waf</guid>
	<pubDate>Tue, 08 Sep 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Metrics That Matter: Continuous Performance Optimization</title>
	<description>To attract and retain customers, you must offer an exceptional digital experience. In an increasingly competitive business climate, organizations are fighting to maintain loyalty and keep users engaged online. The cost of switching is low, consumers are transient, and user expectations for how digital experiences should perform have never been higher.</description>
	<link>https://www.akamai.com/blog/performance/metrics-that-matter-continuous-performance-optimization</link>
	<author>Stephen Stierer</author>
	<guid>https://www.akamai.com/blog/performance/metrics-that-matter-continuous-performance-optimization</guid>
	<pubDate>Wed, 02 Sep 2020 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Women's Foundation of Boston Empowerment Webinar for Girls and Young Women</title>
	<description>Akamai is thrilled to have been the lead sponsor for the recent Women's Foundation of Boston Empowerment Webinar for Girls and Young Women: Girl Decoded: An Intimate Conversation with Author Rana el Kaliouby about finding your voice, pursuing education and excelling as a woman in STEM.
</description>
	<link>https://www.akamai.com/blog/culture/womens-foundation-of-boston-empowerment-webinar-for-girls-and-young-women</link>
	<author>Tiffany Hogan</author>
	<guid>https://www.akamai.com/blog/culture/womens-foundation-of-boston-empowerment-webinar-for-girls-and-young-women</guid>
	<pubDate>Tue, 01 Sep 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Becoming a Comms and Analyst Relations Leader, Rita Aspen - Head, Communications &amp; Analyst Relations, APJ</title>
	<description>My parents were first-generation immigrants from India. They worked hard, made Singapore their home and took all and any challenges head on. They have always lived by the simple philosophy, 'to be the change'. It's a philosophy that I try to live too, and in many ways it's what attracted me to Akamai not too long ago.
</description>
	<link>https://www.akamai.com/blog/culture/becoming-a-comms-and-analyst-relations-leader-rita-aspen-head-communications</link>
	<author>Rita Aspen </author>
	<guid>https://www.akamai.com/blog/culture/becoming-a-comms-and-analyst-relations-leader-rita-aspen-head-communications</guid>
	<pubDate>Wed, 26 Aug 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>How Criminals Attack the Games Industry</title>
	<description>If you work in the video games industry, it's already obvious that security is a challenge, and criminals are a threat. But how much do you know about how the criminal economy works? What actually motivates them? What specific methods do they use? And how do they interact with one another?</description>
	<link>https://www.akamai.com/blog/security/how-criminals-attack-the-games-industry</link>
	<author>Jonathan Singer</author>
	<guid>https://www.akamai.com/blog/security/how-criminals-attack-the-games-industry</guid>
	<pubDate>Wed, 19 Aug 2020 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Ransom Demands Return: New DDoS Extortion Threats From Old Actors Targeting Finance and Retail</title>
	<description>Update 08/24/2020 As mentioned below, the Akamai SIRT has been tracking attacks from the so-called Armada Collective and Fancy Bear actors, who are sending ransom letters to various industry verticals such as finance, travel, and e-commerce. In addition to the...</description>
	<link>https://www.akamai.com/blog/security/ransom-demands-return-new-ddos-extortion-threats-from-old-actors-targeting-finance-and-retail</link>
	<author>Akamai SIRT</author>
	<guid>https://www.akamai.com/blog/security/ransom-demands-return-new-ddos-extortion-threats-from-old-actors-targeting-finance-and-retail</guid>
	<pubDate>Mon, 17 Aug 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Ruchita Biradar - My Virtual Internship at Akamai</title>
	<description>The year is 2020, and the Coronavirus has affected life around the world in so many ways. For me, a third-year engineering student at R.V. Bangalore , I was looking forward to starting my internship at Akamai when the pandemic took hold, and suddenly everything seemed so uncertain.
</description>
	<link>https://www.akamai.com/blog/culture/ruchita-biradar-my-virtual-internship-at-akamai</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/ruchita-biradar-my-virtual-internship-at-akamai</guid>
	<pubDate>Mon, 10 Aug 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>20 Years of Edge Computing</title>
	<description>How long will you wait for something? That depends on what you're waiting for, of course. But in your daily interactions, think about how many "things" you interact with where you expect the response to be instantaneous -- tapping on mobile apps; logging in and transacting with a retailer or a bank; selecting and viewing content on a streaming media device; interacting with a connected device like a light, doorbell, or even a car; or checking in for a train or flight.</description>
	<link>https://www.akamai.com/blog/news/20-years-of-edge-computing</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/news/20-years-of-edge-computing</guid>
	<pubDate>Wed, 05 Aug 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Question Quiz—The Forgotten Scam</title>
	<description>Over a year ago, Akamai’s threat research team published research regarding a widely-used phishing toolkit we referred to as the “Three Question Quiz”.  It’s now time to review the evolution of the toolkit, the associated campaigns that we tracked in the wild, and the potential damage caused by those campaigns in the past year.</description>
	<link>https://www.akamai.com/blog/security/question-quiz-the-forgotten-scam</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/question-quiz-the-forgotten-scam</guid>
	<pubDate>Fri, 31 Jul 2020 01:48:00 UTC</pubDate>

</item>
<item>
	<title>Large, Complex DDoS Attacks on the Rise in 2020</title>
	<description>While we've highlighted both record PPS and BPS attacks mitigated on the Akamai Prolexic Platform over the past few weeks, these attacks are part of a broader trend of increasingly large and complex DDoS activity. We have seen clear indications across the industry of high-water mark DDoS attacks being publicized by multiple vendors. 

The sheer number of large attacks has been unprecedented. The attacks are also noteworthy for their increasing complexity, illustrated in the number and combinations of different attack vectors. The tenacity of attackers is also increasing -- one Akamai customer experienced 14 separate 100+ Gbps attacks in just the first half of 2020. 

"What's new is the concept of campaigns. We go back a couple of years, and 'attack' was the right word to use. There were many attacks every single day, but they weren't, in my opinion, campaign-oriented. Some of our more recent ones are campaign-oriented, where the attacker is working in a coordinated way over an extended period of time." -- Roger Barranco, Vice President, Global Security Operations, Akamai

Some likely reasons for the rise in attacks are a combination of:

The proliferation of DDoS-for-hire tools
Emerging botnets (enterprise DVRs, IoT, etc.) entering the scene
Plenty of motivating factors across social, geopolitical, and online unrest
Quarantine and boredom -- what's a malicious actor supposed to do?
Whatever the unique reason of each attack, the result is the same: a security and IT team needs an effective defense.  </description>
	<link>https://www.akamai.com/blog/security/large--complex-ddos-attacks-on-the-rise-in-2020</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/large--complex-ddos-attacks-on-the-rise-in-2020</guid>
	<pubDate>Tue, 28 Jul 2020 20:04:00 UTC</pubDate>

</item>
<item>
	<title>The Importance of Culture and Collaboration </title>
	<description>I joined Akamai Japan in June 2020. Of course, having worked in technology for my whole career, I already knew of Akamai and our strong reputation. I knew it was an intelligent company, with impressive technology, and - above all - a great story that really inspired me. 
</description>
	<link>https://www.akamai.com/blog/culture/the-importance-of-culture-and-collaboration-mayuko-kiguchi-director</link>
	<author>Mayuko Kiguchi</author>
	<guid>https://www.akamai.com/blog/culture/the-importance-of-culture-and-collaboration-mayuko-kiguchi-director</guid>
	<pubDate>Thu, 09 Jul 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title> Taking a Human Approach to a Global Crisis</title>
	<description>Since March, the COVID crisis has caused massive disruption to every area of life and work. It has tested us, as individuals and as a business. Akamai has taken a very human-centric approach during the pandemic. Our guiding principle has been to do what is right for the health and safety of employees, customers and partners. I feel proud of this, because when I think about what I'm grateful for, it really does come down to people. I'm grateful to be working for a company that is keeping people connected to the world through technology. I'm grateful to be among smart, immensely resilient colleagues. And I'm grateful to have friends and family who are sticking together. Ultimately, it's the humanity that matters. </description>
	<link>https://www.akamai.com/blog/culture/taking-a-human-approach-to-a-global-crisis-by-prasad-mandava</link>
	<author>Prasad Mandava</author>
	<guid>https://www.akamai.com/blog/culture/taking-a-human-approach-to-a-global-crisis-by-prasad-mandava</guid>
	<pubDate>Thu, 02 Jul 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Largest Ever Recorded Packet Per Second-Based DDoS Attack Mitigated by Akamai</title>
	<description>On June 21, 2020, Akamai mitigated the largest packet per second (PPS) distributed denial-of-service (DDoS) attack ever recorded on the Akamai platform. The attack generated 809 million packets per second (Mpps), targeting a large European bank.</description>
	<link>https://www.akamai.com/blog/news/largest-ever-recorded-packet-per-secondbased-ddos-attack-mitigated-by-akamai</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/news/largest-ever-recorded-packet-per-secondbased-ddos-attack-mitigated-by-akamai</guid>
	<pubDate>Thu, 25 Jun 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Do Micro-Segmentation the Right Way</title>
	<description>Micro-segmentation is the central IT security best practice response to overly-permissive policies. Learn how to do it right.</description>
	<link>https://www.akamai.com/blog/security/microsegmentation-done-right</link>
	<author>Dave Klein</author>
	<guid>https://www.akamai.com/blog/security/microsegmentation-done-right</guid>
	<pubDate>Wed, 24 Jun 2020 13:24:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Mitigates Sophisticated 1.44 Tbps and 385 Mpps DDoS Attack</title>
	<description> always surprises me how easily a community can adapt to a new situation or reality. What was once considered an outlier or even an unimaginable situation can quickly become our new normal.

For those of us focused on protecting enterprises from threats, that also couldn't be more accurate. Specifically for the Akamai team working on our Prolexic platform in our Security Operations Command Center (SOCC), mitigating many distributed denial-of-service (DDoS) attacks a day has resulted in increasingly sophisticated automated tooling and expert-level know-how through mitigating these constant attacks.</description>
	<link>https://www.akamai.com/blog/akamai-mitigates-sophisticated-1-44-tbps-and-385-mpps-ddos-attac</link>
	<author>Lorenz Jakober</author>
	<guid>https://www.akamai.com/blog/akamai-mitigates-sophisticated-1-44-tbps-and-385-mpps-ddos-attac</guid>
	<pubDate>Mon, 22 Jun 2020 20:37:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Mitigates Sophisticated 1.44 Tbps and 385 Mpps DDoS Attack</title>
	<description> always surprises me how easily a community can adapt to a new situation or reality. What was once considered an outlier or even an unimaginable situation can quickly become our new normal.

For those of us focused on protecting enterprises from threats, that also couldn't be more accurate. Specifically for the Akamai team working on our Prolexic platform in our Security Operations Command Center (SOCC), mitigating many distributed denial-of-service (DDoS) attacks a day has resulted in increasingly sophisticated automated tooling and expert-level know-how through mitigating these constant attacks.</description>
	<link>https://www.akamai.com/blog/security/akamai-mitigates-sophisticated-1-44-tbps-and-385-mpps-ddos-attack</link>
	<author>Lorenz Jakober</author>
	<guid>https://www.akamai.com/blog/security/akamai-mitigates-sophisticated-1-44-tbps-and-385-mpps-ddos-attack</guid>
	<pubDate>Mon, 22 Jun 2020 20:37:00 UTC</pubDate>

</item>
<item>
	<title>DNS as Code</title>
	<description>Infrastructure as Code (IaC) and Continuous Delivery methods have become increasingly popular amongst development and operations teams as a means of maintaining high-performing websites. </description>
	<link>https://www.akamai.com/blog/security/dns-as-code-</link>
	<author>Sam Preston</author>
	<guid>https://www.akamai.com/blog/security/dns-as-code-</guid>
	<pubDate>Sat, 20 Jun 2020 04:21:00 UTC</pubDate>

</item>
<item>
	<title>The Bondnet Army</title>
	<description>Guardicore Labs has recently picked up Bondnet, a botnet of thousands of compromised servers of varying power. Managed and controlled remotely, the Bondnet is currently used to mine different cryptocurrencies and is ready to be weaponized immediately for other purposes such as mounting DDoS attacks as shown by the Mirai Botnet. Among the botnet’s victims are high profile global companies, universities, city councils and other public institutions.</description>
	<link>https://www.akamai.com/blog/security/the-bondnet-army</link>
	<author>Daniel Goldberg</author>
	<guid>https://www.akamai.com/blog/security/the-bondnet-army</guid>
	<pubDate>Mon, 08 Jun 2020 21:19:00 UTC</pubDate>

</item>
<item>
	<title>Stealthworker: Golang-based Brute Force Malware Still an Active Threat</title>
	<description>By: Larry Cashdollar Malware that can target Windows and Linux systems was recently installed on my honeypot. After some investigation, I determined it to be similar to the malware discovered in February of 2019 by Malwarebytes, and later examined by...</description>
	<link>https://www.akamai.com/blog/security/stealthworker-golang-based-brute-force-malware-still-an-active-threat</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/stealthworker-golang-based-brute-force-malware-still-an-active-threat</guid>
	<pubDate>Wed, 03 Jun 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>My Advice For Candidates During the COVID-19 Environment</title>
	<description>Kerry Condon is Global Head of Talent Acquisition at Akamai Technologies. With more than 20 years' experience as a strategic human resources leader across emerging and developed markets, she shares her take on how candidates can put their best foot forward during these unusual times.
</description>
	<link>https://www.akamai.com/blog/culture/my-advice-for-candidates-during-the-covid-19-environment</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/my-advice-for-candidates-during-the-covid-19-environment</guid>
	<pubDate>Fri, 29 May 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Banks Prioritizing Microsegmentation</title>
	<description>Learn how microsegmentation allows financial institutions to achieve goals, from automation to streamlining firewall compliance, while protected.</description>
	<link>https://www.akamai.com/blog/security/why-banks-should-prioritize-microsegmentation</link>
	<author>Ola Sergatchov</author>
	<guid>https://www.akamai.com/blog/security/why-banks-should-prioritize-microsegmentation</guid>
	<pubDate>Wed, 27 May 2020 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Watch Your Step: The Prevalence of IDN Homograph Attacks</title>
	<description>The internationalized domain name (IDN) homograph attack is used to form domain names that visually resemble legitimate domain names, albeit, using a different set of characters [1]. For example, the IDN </description>
	<link>https://www.akamai.com/blog/security/watch-your-step-the-prevalence-of-idn-homograph-attacks</link>
	<author>Asaf Nadler</author>
	<guid>https://www.akamai.com/blog/security/watch-your-step-the-prevalence-of-idn-homograph-attacks</guid>
	<pubDate>Wed, 27 May 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Record 0-Second SLA PPS Mitigation</title>
	<description>On May 2, 2020, Akamai blocked a large PPS-focused attack against one of our financial services customers in 0 seconds, utilizing a proactive mitigation posture. This was one of the largest PPS levels we have on record, and the biggest mitigated to date in 0 seconds. The attacker launched a bevy of minimally sized UDP packets in an attempt to overwhelm network gear in the customer's data center.</description>
	<link>https://www.akamai.com/blog/security/record-0-second-sla-pps-mitigation</link>
	<author>Tom Emmons</author>
	<guid>https://www.akamai.com/blog/security/record-0-second-sla-pps-mitigation</guid>
	<pubDate>Tue, 26 May 2020 21:14:00 UTC</pubDate>

</item>
<item>
	<title>Working From Home. So Far, So Much Learned.</title>
	<description>Hello all! I'm Nicole Fitzpatrick, Deputy General Counsel at Akamai. I also sit on the D&amp;I Executive Steering Committee. Normally I'd be in our Cambridge office about now, but like so many of us I am working from home and writing this surrounded by four kids, the dog and my husband (not written in particular order of importance, by the way). </description>
	<link>https://www.akamai.com/blog/culture/working-from-home-so-far-so-much-learned1</link>
	<author>Nicole Fitzpatrick</author>
	<guid>https://www.akamai.com/blog/culture/working-from-home-so-far-so-much-learned1</guid>
	<pubDate>Wed, 13 May 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Parts of a Whole: Effect of COVID-19 on US Internet Traffic</title>
	<description>Introduction In our previous post, The Building Wave of Internet Traffic, we looked at the traffic patterns across Europe and the effect the COVID-19 pandemic has had. We examined traffic in Italy, Poland, and Spain, and demonstrated how we observed...</description>
	<link>https://www.akamai.com/blog/security/parts-of-a-whole-effect-of-covid-19-on-us-internet-traffic</link>
	<author>Martin McKeay</author>
	<guid>https://www.akamai.com/blog/security/parts-of-a-whole-effect-of-covid-19-on-us-internet-traffic</guid>
	<pubDate>Wed, 29 Apr 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Brazil Targeted by Phishing Scam Harnessing COVID-19 Fears</title>
	<description>Researchers at Akamai have identified a new phishing campaign targeting users in Brazil who are worried about their finances during the COVID-19 epidemic. Over two weeks, we identified that the three-question quiz campaign successfully targeted more than 850,000 victims, scamming them out of personal information, and in some cases, convincing them to install Adware on their computer.</description>
	<link>https://www.akamai.com/blog/security/brazil-targeted-by-phishing-scam-harnessing-covid-19-fears</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/brazil-targeted-by-phishing-scam-harnessing-covid-19-fears</guid>
	<pubDate>Tue, 28 Apr 2020 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Staying Healthy, Focused, and Above All Grateful During the COVID-19 Crisis</title>
	<description>By now, we are all subject in one way or another to the far-reaching impact of COVID-19. As we see on the news each day, the numbers of those infected by this deadly coronavirus continue to grow in terrifying increments. And even for those of us without family members or friends directly impacted by the virus, life has profoundly changed. 
</description>
	<link>https://www.akamai.com/blog/culture/staying-healthy-focused-and-above-all-grateful-during-the-covid-crisis</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/staying-healthy-focused-and-above-all-grateful-during-the-covid-crisis</guid>
	<pubDate>Fri, 17 Apr 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>What’s a 10? Pwning vCenter with CVE-2020-3952</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/pwning-vmware-vcenter-cve-2020-3952</link>
	<author>JJ Lehmann</author>
	<guid>https://www.akamai.com/blog/security/pwning-vmware-vcenter-cve-2020-3952</guid>
	<pubDate>Wed, 15 Apr 2020 18:47:00 UTC</pubDate>

</item>
<item>
	<title>A QUICk Introduction to HTTP/3</title>
	<description>HTTP/3 is the newest iteration of the HTTP protocol that improves web security and performance. </description>
	<link>https://www.akamai.com/blog/developers/a-quick-introduction-http3</link>
	<author>Javier Garza</author>
	<guid>https://www.akamai.com/blog/developers/a-quick-introduction-http3</guid>
	<pubDate>Tue, 14 Apr 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>The Building Wave of Internet Traffic</title>
	<description>The Novel Coronavirus, and the resulting viral respiratory illness caused by it, COVID-19, is changing our world. As much as possible, people around the world are practicing social distancing. This means working remotely for a large number of people, possibly...</description>
	<link>https://www.akamai.com/blog/security/the-building-wave-of-internet-traffic</link>
	<author>Martin McKeay</author>
	<guid>https://www.akamai.com/blog/security/the-building-wave-of-internet-traffic</guid>
	<pubDate>Mon, 13 Apr 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Threat Actors Recycling Phishing Kits in New Coronavirus (COVID-19) Campaigns</title>
	<description>Recently, researchers at Akamai observed phishing attacks leveraging recycled kits in a series of campaigns taking advantage of the Coronavirus (COVID-19) health crisis. Phishing kits that have been previously deployed over the last several months are now being used again in order to reach a new pool of potential victims: those working from home due to self-isolation, mandated quarantine, or corporate policy during the pandemic.</description>
	<link>https://www.akamai.com/blog/security/threat-actors-recycling-phishing-kits-in-new-coronavirus--covid-</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/threat-actors-recycling-phishing-kits-in-new-coronavirus--covid-</guid>
	<pubDate>Fri, 03 Apr 2020 05:19:00 UTC</pubDate>

</item>
<item>
	<title>The Vollgar Campaign: MS-SQL Servers Under Attack</title>
	<description>Guardicore Labs uncovers an attack campaign that’s been under the radar for almost two years, breaching MS-SQL servers and infecting them with remote-access tools and cryptominers.</description>
	<link>https://www.akamai.com/blog/security/vollgar-ms-sql-servers-under-attack</link>
	<author>Ophir Harpaz</author>
	<guid>https://www.akamai.com/blog/security/vollgar-ms-sql-servers-under-attack</guid>
	<pubDate>Wed, 01 Apr 2020 14:56:00 UTC</pubDate>

</item>
<item>
	<title>Working Together to Manage Global Internet Traffic Increases</title>
	<description>As businesses and consumers around the world adjust their routines amid the various COVID-19 restrictions, the internet is being used at a scale that the world has never experienced. In addition to millions of people who are now working from...</description>
	<link>https://www.akamai.com/blog/news/working-together-to-manage-global-internet-traffic-increases</link>
	<author>Tom Leighton</author>
	<guid>https://www.akamai.com/blog/news/working-together-to-manage-global-internet-traffic-increases</guid>
	<pubDate>Tue, 24 Mar 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>An Accelerator Program for Early Stage Innovations in Water</title>
	<description>Continuing in our commitment to sustainability, Akamai is excited to announce the launch of our accelerator program supporting innovators and building solutions to address India's water challenges. </description>
	<link>https://www.akamai.com/blog/culture/an-accelerator-program-for-early-stage-innovations-in-water</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/an-accelerator-program-for-early-stage-innovations-in-water</guid>
	<pubDate>Fri, 20 Mar 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>How To Protect Your Systems Against Critical SMB Vulnerabilities (CVE-2020-0796)</title>
	<description>Discover how to protect your systems against SMB vulnerabilities and the latest critical Microsoft vulnerabilities released.</description>
	<link>https://www.akamai.com/blog/security/how-to-protect-your-systems-against-critical-smb-vulnerabilities-cve-2020-0796</link>
	<author>Igor Livshitz</author>
	<guid>https://www.akamai.com/blog/security/how-to-protect-your-systems-against-critical-smb-vulnerabilities-cve-2020-0796</guid>
	<pubDate>Tue, 17 Mar 2020 20:12:00 UTC</pubDate>

</item>
<item>
	<title>Change the Rules Speaker Event</title>
	<description>Akamai's Women's Forum Americas, OHANA and In Reach Employee Resource Groups recently hosted Cross ERG 'Change the Rules' Keynote - Celebration of Black History Month in our Chicago office. We were excited to have notable Michelle Silverthorn, CEO of Inclusion Nation, a company that focuses on improving recruitment, retention, and the promotion of diverse professionals, as the keynote speaker. It is not often that we have an external speaker join us and have the impact Michelle had with her talk on Changing the Rules. Her stories resonated with the audience and her actionable approach was most appreciated.
</description>
	<link>https://www.akamai.com/blog/culture/change-the-rules-speaker-event</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/change-the-rules-speaker-event</guid>
	<pubDate>Tue, 17 Mar 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Phishing Victims From a CDN's Point of View</title>
	<description>Overview Being a Content Delivery Network (CDN) platform, sometimes you can see fractions of attacks on the wire. In this blog, we will focus on phishing websites that, while not being delivered by the Akamai platform, are referring to or...</description>
	<link>https://www.akamai.com/blog/security/phishing-victims-from-a-cdns-point-of-view</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/phishing-victims-from-a-cdns-point-of-view</guid>
	<pubDate>Tue, 10 Mar 2020 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Growing, Exploring and My First Conference</title>
	<description>By now, we are all subject in one way or another to the far-reaching impact of COVID-19. As we see on the news each day, the numbers of those infected by this deadly coronavirus continue to grow in terrifying increments. And even for those of us without family members or friends directly impacted by the virus, life has profoundly changed. 
</description>
	<link>https://www.akamai.com/blog/culture/bridget-meuse-growing-exploring-and-my-first-conference</link>
	<author>Bridget Meuse</author>
	<guid>https://www.akamai.com/blog/culture/bridget-meuse-growing-exploring-and-my-first-conference</guid>
	<pubDate>Mon, 02 Mar 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Guardicore at RSA: AI-Powered Segmentation, Cloud Native Security</title>
	<description>This week we’re announcing two new capabilities in our Centra Security Platform that further deliver on that mission: Support for cloud-native resources and AI-powered segmentation.</description>
	<link>https://www.akamai.com/blog/security/ai-powered-segmentation-cloud-native-security</link>
	<author>Guardicore Labs Team</author>
	<guid>https://www.akamai.com/blog/security/ai-powered-segmentation-cloud-native-security</guid>
	<pubDate>Thu, 27 Feb 2020 20:38:00 UTC</pubDate>

</item>
<item>
	<title>How I Avoided a Recruiter Scam</title>
	<description>Recruitment scams are a serious, but often overlooked risk to job seekers. Those responsible for these schemes often play on the victim's stress levels or professional ego, by using authority to offer something that could be life changing, often with large salaries. I've personally experienced a recruitment scam. In this post, we'll explore the scam that targeted me, and the steps I took that prevented me from becoming a victim.</description>
	<link>https://www.akamai.com/blog/trends/how-i-avoided-a-recruiter-scam</link>
	<author>Danny Stern</author>
	<guid>https://www.akamai.com/blog/trends/how-i-avoided-a-recruiter-scam</guid>
	<pubDate>Tue, 25 Feb 2020 16:30:00 UTC</pubDate>

</item>
<item>
	<title>Introducing Guardicore Threat Intelligence Firewall</title>
	<description>Guardicore’s Threat Intelligence Firewall blocks connections to malicious IPs, limiting security attack surface before reaching critical assets.</description>
	<link>https://www.akamai.com/blog/security/introducing-guardicore-threat-intelligence-firewall</link>
	<author>Mor Matalon</author>
	<guid>https://www.akamai.com/blog/security/introducing-guardicore-threat-intelligence-firewall</guid>
	<pubDate>Wed, 19 Feb 2020 12:09:00 UTC</pubDate>

</item>
<item>
	<title>Tackling DGA Based Malware Detection in DNS Traffic</title>
	<description>Earlier this year, Akamai's Enterprise team tackled the problem of DGA detection in the wild by using Neural Networks, essentially creating a state-of-the-art solution for near online detection of DGA communication....</description>
	<link>https://www.akamai.com/blog/security/tackling-dga-based-malware-detection-in-dns-traffic</link>
	<author>Yael Daihes</author>
	<guid>https://www.akamai.com/blog/security/tackling-dga-based-malware-detection-in-dns-traffic</guid>
	<pubDate>Tue, 18 Feb 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>At 21 Tbps, Reaching New Levels of IPv6 Traffic</title>
	<description>The global adoption of IPv6 is important to the future of the internet and Akamai has been committed to helping move IPv6 deployment forward ever since we launched production IPv6 support in 2012.</description>
	<link>https://www.akamai.com/blog/performance/at-21-tbps-reaching-new-levels-ipv6-traffic</link>
	<author>Erik Nygren</author>
	<guid>https://www.akamai.com/blog/performance/at-21-tbps-reaching-new-levels-ipv6-traffic</guid>
	<pubDate>Thu, 13 Feb 2020 16:46:00 UTC</pubDate>

</item>
<item>
	<title>Supporting COVID-19 Vaccine Rollouts with Vaccine Edge</title>
	<description>Global efforts to produce and distribute the COVID-19 vaccine continue to race ahead. But in many cases, that race is an uphill climb. Beyond the challenges in making enough of the vaccine, educating the public, and the logistics of distributing the doses, there is a new challenge. Bots. </description>
	<link>https://www.akamai.com/blog/security/supporting-covid-19-vaccine-rollouts-with-vaccine-edge</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/security/supporting-covid-19-vaccine-rollouts-with-vaccine-edge</guid>
	<pubDate>Mon, 10 Feb 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Women in Security: Security Technical Project Manager</title>
	<description>We continue to see large-scale online security attacks affecting corporations and public institutions. These attacks are becoming more and more sophisticated, making it harder to protect yourself. The constant evolution of attacks requires innovative solutions that only Akamai can provide....</description>
	<link>https://www.akamai.com/blog/culture/women-in-security-security-technical-project-manager</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/women-in-security-security-technical-project-manager</guid>
	<pubDate>Wed, 05 Feb 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Abusing the Service Workers API</title>
	<description> The Service Worker web API is a powerful new API for web browsers. During our research, we have found several ways attackers can leverage this API to enhance their low-to-medium risk findings into a powerful and meaningful attack. By...</description>
	<link>https://www.akamai.com/blog/security/abusing-the-service-workers-api</link>
	<author>Daniel Abeles</author>
	<guid>https://www.akamai.com/blog/security/abusing-the-service-workers-api</guid>
	<pubDate>Mon, 20 Jan 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Guardicore Centra Release v 31</title>
	<description>Guardicore Centra v 31 includes such features as user-based rules and a threat intelligence firewall. Read more about the updates and improvements.</description>
	<link>https://www.akamai.com/blog/security/whats-new-in-guardicore-centra-release-31</link>
	<author>Ravit Greitser</author>
	<guid>https://www.akamai.com/blog/security/whats-new-in-guardicore-centra-release-31</guid>
	<pubDate>Sun, 19 Jan 2020 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Virtual Desktop Infrastructure (VDI) – Risks and Solutions</title>
	<description>Leverage the benefits of VDI without opening yourself to security risk. Guardicore provides user access management and microsegmentation for Citrix.</description>
	<link>https://www.akamai.com/blog/security/virtual-desktop-infrastructure-vdi-risks-and-solutions</link>
	<author>Sharon Besser</author>
	<guid>https://www.akamai.com/blog/security/virtual-desktop-infrastructure-vdi-risks-and-solutions</guid>
	<pubDate>Wed, 15 Jan 2020 17:52:00 UTC</pubDate>

</item>
<item>
	<title>HTTP Cache Poisoning Advisory</title>
	<description>Summary On January 14, 2020, CERT CC published an advisory warning of the potential use of Content Delivery Networks (CDNs) to cache malicious traffic. Akamai acknowledges this issue and has been aware of similar research in the past. This advisory...</description>
	<link>https://www.akamai.com/blog/security/http-cache-poisoning-advisory</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/security/http-cache-poisoning-advisory</guid>
	<pubDate>Mon, 13 Jan 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Streaming and Security: In Conversation With Smita Aeron</title>
	<description>People from around the globe are looking for instant and uninterrupted access to streaming services, on any device and in any location. But delivering high-quality streams that can easily scale to meet audience demand is no easy task. To better...</description>
	<link>https://www.akamai.com/blog/culture/streaming-and-security-in-conversation-with-smita-aeron</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/streaming-and-security-in-conversation-with-smita-aeron</guid>
	<pubDate>Sat, 11 Jan 2020 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Guardicore Centra Integration now available on CyberArk Marketplace</title>
	<description>Privileged Access Management is part of a zero-trust model. Guardicore strengthens its offering by integrating with CyberArk.</description>
	<link>https://www.akamai.com/blog/security/guardicore-integrates-with-cyberark-for-privileged-access-management</link>
	<author>Sharon Besser</author>
	<guid>https://www.akamai.com/blog/security/guardicore-integrates-with-cyberark-for-privileged-access-management</guid>
	<pubDate>Sun, 08 Dec 2019 14:24:00 UTC</pubDate>

</item>
<item>
	<title>Managing Traffic From the Outset: How GTM Can Make Your Deployments Easier</title>
	<description>Global Traffic Management, or GTM, is a DNS-based load balancing service that offers application owners a level of flexibility and insight that is unmatched by traditional on-prem solutions. </description>
	<link>https://www.akamai.com/blog/performance/managing-traffic-from-the-outset-how-gtm-can-make-your-deploymets</link>
	<author>Sam Preston</author>
	<guid>https://www.akamai.com/blog/performance/managing-traffic-from-the-outset-how-gtm-can-make-your-deploymets</guid>
	<pubDate>Thu, 05 Dec 2019 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Akamai Foundation and Social Responsibility</title>
	<description>Recently, at Akamai, we launched the Akamai Foundation, to continue to reach a broader, more diverse range of young people with quality Science, Technology, Engineering and Math (STEM) education. We believe that this work is a vital part of securing...</description>
	<link>https://www.akamai.com/blog/culture/akamai-foundation-and-social-responsibility</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/akamai-foundation-and-social-responsibility</guid>
	<pubDate>Fri, 22 Nov 2019 05:00:00 UTC</pubDate>

</item>
<item>
	<title>In Conversation: Successful Women</title>
	<description>Success is a tricky word to define. It means something different to everyone and can only be measured by an individual themselves. Often, success is seen as being about what an individual achieves, rather than about who they grow to...</description>
	<link>https://www.akamai.com/blog/culture/in-conversation-successful-women</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/in-conversation-successful-women</guid>
	<pubDate>Fri, 15 Nov 2019 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Fake Cozy Bear Group Making DDoS Extortion Demands</title>
	<description>A group calling themselves "Cozy Bear" has been emailing various companies with an extortion letter, demanding payment and threatening targeted DDoS attacks if their demands are not met....</description>
	<link>https://www.akamai.com/blog/security/fake-cozy-bear-group-making-ddos-extortion-demands</link>
	<author>Akamai SIRT</author>
	<guid>https://www.akamai.com/blog/security/fake-cozy-bear-group-making-ddos-extortion-demands</guid>
	<pubDate>Fri, 15 Nov 2019 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Phishing Detection via Analytic Networks</title>
	<description>As mentioned in previous Akamai blogs, phishing is an ecosystem of mostly framework developers and buyers who purchase kits to harvest credentials and other sensitive information. Like many framework developers, those focusing on phishing kits want to create an efficient...</description>
	<link>https://www.akamai.com/blog/security/phishing-detection-via-analytic-networks</link>
	<author>Tomer Shlomo</author>
	<guid>https://www.akamai.com/blog/security/phishing-detection-via-analytic-networks</guid>
	<pubDate>Wed, 06 Nov 2019 05:00:00 UTC</pubDate>

</item>
<item>
	<title>My First Job—Being Inspired and Having an Impact</title>
	<description>Written by Bridget Meuse, Product Marketing Specialist - Corporate Sustainability I've recently hit my four-month mark here at Akamai and it's been a whirlwind, to say the least. Despite having had two previous summer internships at Akamai, stepping into my...</description>
	<link>https://www.akamai.com/blog/culture/my-first-job-being-inspired-and-having-an-impact</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/my-first-job-being-inspired-and-having-an-impact</guid>
	<pubDate>Tue, 05 Nov 2019 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Volunteering with Girls Who Code </title>
	<description>Volunteering with Girls Who Code has been one of the most enriching and edifying experiences of my time here at Akamai. I was chosen to serve as a mentor to one of the high school students, gave the NOCC tour...</description>
	<link>https://www.akamai.com/blog/culture/volunteering-with-girls-who-code</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/volunteering-with-girls-who-code</guid>
	<pubDate>Fri, 25 Oct 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Tech That Makes a Difference: Sustainability</title>
	<description>As the Internet grows, so does energy usage. As a result, all large tech organizations have a responsibility to monitor and improve their impact on the environment. At Akamai, we are well aware of the impact we can have, both...</description>
	<link>https://www.akamai.com/blog/culture/tech-that-makes-a-difference-sustainability</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/tech-that-makes-a-difference-sustainability</guid>
	<pubDate>Wed, 23 Oct 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Enhancing Video Streaming Quality for Exoplayer -- Part 2: Buffering Strategy to Lower Startup Time and Video On-Demand Rebuffering </title>
	<description>The first part of this blog series discussed about the quality of user experience (QoE) metrics and two strategies that heavily influence the QoE: the bitrate selection...</description>
	<link>https://www.akamai.com/blog/performance/enhancing-video-streaming-quality-for-exoplayer-part-2-exoplayers-buffering-strategy-how-to-lower</link>
	<author>Domitian Tamas-Selicean</author>
	<guid>https://www.akamai.com/blog/performance/enhancing-video-streaming-quality-for-exoplayer-part-2-exoplayers-buffering-strategy-how-to-lower</guid>
	<pubDate>Wed, 23 Oct 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Data in the dark: Data protection</title>
	<description>Hyperconnectivity is on the rise and, as a result, corporations' capacity to protect their own and their customers' data becomes more and more limited. Connection takes place over a network, so, as connection increases, that network increases in size</description>
	<link>https://www.akamai.com/blog/culture/data-in-the-dark-data-protection</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/data-in-the-dark-data-protection</guid>
	<pubDate>Fri, 11 Oct 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Faster JWT Key Rotation in API Gateway</title>
	<description>JSON Web Tokens (JWT) use digital signatures to establish the authenticity of the data they contain, as well as authenticating the identity of the signer. A valid signature check ensures that any party can rely on the contents and the...</description>
	<link>https://www.akamai.com/blog/news/verify-jwt-with-json-web-key-set-jwks-in-api-gateway</link>
	<author>Jeffrey Costa</author>
	<guid>https://www.akamai.com/blog/news/verify-jwt-with-json-web-key-set-jwks-in-api-gateway</guid>
	<pubDate>Fri, 11 Oct 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Maximizing Onboarding: Giving managers the skills for success</title>
	<description>Managing teams come with challenges as well as rewards. Managers drive individual and team performance, and the best managers drive employee connection and engagement. Akamai believes that employees are our biggest asset; by effectively and efficiently integrating them into the...</description>
	<link>https://www.akamai.com/blog/culture/maximizing-onboarding-giving-managers-the-skills-for-success</link>
	<author>Andrew Heifetz</author>
	<guid>https://www.akamai.com/blog/culture/maximizing-onboarding-giving-managers-the-skills-for-success</guid>
	<pubDate>Mon, 30 Sep 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>From the Beginning: Internships With Akamai</title>
	<description>At Akamai, our internships are both unique and meaningful. What do we mean by this? Well, we believe an internship should add real, significant value to an intern's skill-set. So, not only do they get to learn on the job...</description>
	<link>https://www.akamai.com/blog/culture/from-the-beginning-internships-with-akamai</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/from-the-beginning-internships-with-akamai</guid>
	<pubDate>Fri, 27 Sep 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>The Massive Propagation Of The Smominru Botnet</title>
	<description>In this post, Guardicore Labs provides an in-depth analysis of the attack campaign, focusing on victim analysis and attack infrastructure. </description>
	<link>https://www.akamai.com/blog/security/the-massive-propagation-of-the-smominru-botnet</link>
	<author>Ophir Harpaz</author>
	<guid>https://www.akamai.com/blog/security/the-massive-propagation-of-the-smominru-botnet</guid>
	<pubDate>Wed, 18 Sep 2019 13:00:00 UTC</pubDate>

</item>
<item>
	<title>New DDoS Vector Observed in the Wild: WSD Attacks Hitting 35/Gbps</title>
	<description>Additional research and support provided by Chad Seaman. Introduction Members of Akamai's Security Intelligence Response Team have been investigating a new DDoS vector that leverages a UDP Amplification technique known as WS-Discovery (WSD). The situation surrounding WSD was recently made...</description>
	<link>https://www.akamai.com/blog/security/new-ddos-vector-observed-in-the-wild-wsd-attacks-hitting-35gbps</link>
	<author>Jonathan Respeto</author>
	<guid>https://www.akamai.com/blog/security/new-ddos-vector-observed-in-the-wild-wsd-attacks-hitting-35gbps</guid>
	<pubDate>Wed, 18 Sep 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>XMR Cryptomining Targeting x86/i686 Systems</title>
	<description>I have been playing close attention to Internet of Things (IoT) malware targeting systems with Telnet enabled, while also collecting samples targeting systems with SSH enabled on port 22. I've collected over 650 samples landing in my honeypot within the...</description>
	<link>https://www.akamai.com/blog/security/xmr-cryptomining-targeting-x86i686-systems</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/xmr-cryptomining-targeting-x86i686-systems</guid>
	<pubDate>Fri, 30 Aug 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>In Conversation: The Women in Network Security</title>
	<description>Why does network security matter? On average, there is a hacker attack every 39 seconds. If any of these attacks result in a data breach, they could cost over $150 million, with research suggesting that cyber-attacks could cost businesses over...</description>
	<link>https://www.akamai.com/blog/culture/in-conversation-the-women-in-network-security</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/in-conversation-the-women-in-network-security</guid>
	<pubDate>Thu, 22 Aug 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Edge DNS: Zone Apex Mapping &amp; DNSSEC</title>
	<description>Along with its DDoS resilience and impressive global footprint, Akamai Edge DNS offers zone administrators additional technical flexibility and implementation options to improve performance and simplify DNS operations. One example is zone apex mapping (ZAM), a feature that enables top level hostnames (e.g., akamai.com) to resolve directly to an Akamai edge IP. The popularity and appeal of ZAM do, however, prompt a number of questions about the technical specifics, such as: Is ZAM interoperable with DNSSEC?</description>
	<link>https://www.akamai.com/blog/security/edge-dns--zone-apex-mapping---dnssec</link>
	<author>Sam Preston</author>
	<guid>https://www.akamai.com/blog/security/edge-dns--zone-apex-mapping---dnssec</guid>
	<pubDate>Mon, 19 Aug 2019 07:00:00 UTC</pubDate>

</item>
<item>
	<title>HTTP2 Vulnerabilities</title>
	<description>On Tuesday, August 13th at 10 AM Pacific Time (1700UTC), Netflix publicly disclosed a series of vulnerabilities found by Jonathan Looney that impact many implementations of the HTTP2 protocol. A vulnerability found by Piotr Sikora of Google was also released...</description>
	<link>https://www.akamai.com/blog/security/http2-vulnerabilities</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/security/http2-vulnerabilities</guid>
	<pubDate>Tue, 13 Aug 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>From On-Prem to Cloud: The Complete AWS Security Checklist</title>
	<description>This complete AWS cloud auditing security checklist outlines what it takes to protect sensitive data center security &amp; intellectual property when securing an organization’s cloud deployment.</description>
	<link>https://www.akamai.com/blog/security/complete-cloud-migration-aws-security-checklist</link>
	<author>Igor Livshitz</author>
	<guid>https://www.akamai.com/blog/security/complete-cloud-migration-aws-security-checklist</guid>
	<pubDate>Thu, 08 Aug 2019 18:27:00 UTC</pubDate>

</item>
<item>
	<title>Diversity of Thought in Tech</title>
	<description>At Akamai, we believe innovation is only possible when the various viewpoints and experiences of a collective, culminate to make a great idea. It is the variety of these ideas which is important. Why does diversity of thought matter? When...</description>
	<link>https://www.akamai.com/blog/culture/diversity-of-thought-in-tech</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/diversity-of-thought-in-tech</guid>
	<pubDate>Tue, 30 Jul 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Criminals Using Targeted Remote File Inclusion Attacks in Phishing Campaigns</title>
	<description>In June 2019, logs on my personal website recorded markers that were clearly Remote File Inclusion (RFI) vulnerability attempts. The investigation into the attempts uncovered a campaign of targeted RFI attacks that currently are being leveraged to deploy phishing kits....</description>
	<link>https://www.akamai.com/blog/security/criminals-using-targeted-remote-file-inclusion-attacks-in-phishing-campaigns</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/criminals-using-targeted-remote-file-inclusion-attacks-in-phishing-campaigns</guid>
	<pubDate>Mon, 29 Jul 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>In Conversation: It's Never Too Late</title>
	<description>There can be barriers to pursuing a career in tech. For many people, the journey isn't straightforward. Many of our Akamai employees have diverse backgrounds and have overcome obstacles to pursue their dream career. Often, the way forward into a...</description>
	<link>https://www.akamai.com/blog/culture/in-conversation-its-never-too-late</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/in-conversation-its-never-too-late</guid>
	<pubDate>Sat, 20 Jul 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Pykspa v2 DGA updated to become selective</title>
	<description>Additional research and information provided by Asaf Nadler Recent changes to the Pykspa v2 domain generation algorithm (DGA) have made it more selective. Akamai researchers have tracked these changes and believe that part of the reason for selective domain generation...</description>
	<link>https://www.akamai.com/blog/security/pykspa-v2-dga-updated-to-become-selective</link>
	<author>Lior Lahav</author>
	<guid>https://www.akamai.com/blog/security/pykspa-v2-dga-updated-to-become-selective</guid>
	<pubDate>Thu, 11 Jul 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>NSX-T vs. NSX-V – Key Differences and Pitfalls to Avoid</title>
	<description>Learn the difference between VMware’s segmentation offerings, NSX-T vs NSX-V, and understand the several potential pitfalls that are important to consider before deployment.</description>
	<link>https://www.akamai.com/blog/security/nsx-t-vs-nsx-v-key-differences-and-pitfalls-to-avoid</link>
	<author>Dave Burton</author>
	<guid>https://www.akamai.com/blog/security/nsx-t-vs-nsx-v-key-differences-and-pitfalls-to-avoid</guid>
	<pubDate>Sun, 07 Jul 2019 15:57:00 UTC</pubDate>

</item>
<item>
	<title>SIRT Advisory: Silexbot Bricking Systems With Known Default Login Credentials</title>
	<description>On June 25th, I discovered a new bot named Silexbot on my honeypot. The bot itself is a blunt tool used to destroy IoT devices. Its author, someone who claims to be a 14-year-old boy from Europe, has made his...</description>
	<link>https://www.akamai.com/blog/security/sirt-advisory-silexbot-bricking-systems-with-known-default-login-credentials</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/sirt-advisory-silexbot-bricking-systems-with-known-default-login-credentials</guid>
	<pubDate>Wed, 26 Jun 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>In Conversation: Career Development as a Parent</title>
	<description>Technology can only continue to thrive with the direct influence of those involved in its evolution. When the experiences of those people are broad, the tech industry benefits from the diversity of what they bring to the table. At Akamai,...</description>
	<link>https://www.akamai.com/blog/culture/in-conversation-career-development-as-a-parent</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/in-conversation-career-development-as-a-parent</guid>
	<pubDate>Sun, 23 Jun 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Enhancing video streaming quality for ExoPlayer - Part 1: Quality of User Experience Metrics</title>
	<description>The online video player landscape is fragmented with a wide variety of players across a mix of popular platforms. In the world of HTML5-video players in browsers, there are a number of open-source solutions (e.g., hls.js, dash.js, Shaka Player), as well as commercial offerings which include Akamai's AMP.</description>
	<link>https://www.akamai.com/blog/performance/enhancing-video-streaming-quality-for-exoplayer-part-1-quality-of-user-experience-metrics</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/performance/enhancing-video-streaming-quality-for-exoplayer-part-1-quality-of-user-experience-metrics</guid>
	<pubDate>Wed, 19 Jun 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>CloudTest Vulnerability (CVE-2019-11011)</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/cloudtest-vulnerability-cve-2019-11011</link>
	<author>Akamai InfoSec</author>
	<guid>https://www.akamai.com/blog/security/cloudtest-vulnerability-cve-2019-11011</guid>
	<pubDate>Sun, 16 Jun 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Latest ECHOBOT:  26 Infection Vectors</title>
	<description>Introduction Since the release of the Mirai source code in October of 2016, there have been hundreds of variants. While publishing my own research, I noticed that Palo Alto Networks was also examining similar samples, and published their findings. Earlier...</description>
	<link>https://www.akamai.com/blog/security/latest-echobot-26-infection-vectors</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/latest-echobot-26-infection-vectors</guid>
	<pubDate>Thu, 13 Jun 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>In Conversation: New Starters</title>
	<description>The world is changing. At Akamai, we're proud to be part of the shift towards a more inclusive future. Where digital systems may replace human processes, we are determined to keep people at the center of our focus. After all,...</description>
	<link>https://www.akamai.com/blog/culture/in-conversation-new-starters</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/in-conversation-new-starters</guid>
	<pubDate>Wed, 12 Jun 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Catch Me If You Can: Evasive and Defensive Techniques in Phishing</title>
	<description>Phishing is a multifaceted type of attack, aimed at collecting usernames and passwords, personal information, or sometimes both. Yet, these attacks only work so long as the phishing kit itself remains hidden. Phishing is a numbers game and time is...</description>
	<link>https://www.akamai.com/blog/security/catch-me-if-you-can-evasive-and-defensive-techniques-in-phishing</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/catch-me-if-you-can-evasive-and-defensive-techniques-in-phishing</guid>
	<pubDate>Wed, 12 Jun 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Identifying Vulnerabilities in Phishing Kits</title>
	<description>While recently examining hundreds of phishing kits for ongoing research, Akamai discovered something interesting - several of the kits included basic vulnerabilities due to flimsy construction or reliance on outdated open source code. Considering the impact phishing kits have on...</description>
	<link>https://www.akamai.com/blog/security/identifying-vulnerabilities-in-phishing-kits</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/identifying-vulnerabilities-in-phishing-kits</guid>
	<pubDate>Wed, 05 Jun 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Our Ceiling, Their Floor, Educating the Future</title>
	<description>Throughout this blog series, we've been discussing the future of tech in relation to our young people. At Akamai, our outreach programs and forward-thinking culture have positioned us as part of the movement determined to make the world better for...</description>
	<link>https://www.akamai.com/blog/culture/our-ceiling-their-floor-educating-the-future</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/our-ceiling-their-floor-educating-the-future</guid>
	<pubDate>Wed, 29 May 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>16Shop: Commercial Phishing Kit Has A Hidden Backdoor</title>
	<description>Additional research by Or Katz When it comes to targeting Apple users and their personal and financial data, 16Shop has emerged as a go to kit for those who can afford it. While 16Shop is sold to criminals looking to...</description>
	<link>https://www.akamai.com/blog/security/16shop-commercial-phishing-kit-has-a-hidden-backdoor</link>
	<author>Amiram Cohen</author>
	<guid>https://www.akamai.com/blog/security/16shop-commercial-phishing-kit-has-a-hidden-backdoor</guid>
	<pubDate>Tue, 21 May 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Preventing the Top Data Center Breaches</title>
	<description>Data center breaches can seem impossible to avoid, but good data center security can seriously reduce your risk. We look at famous breaches Equifax, Yahoo, &amp; more.</description>
	<link>https://www.akamai.com/blog/security/recent-data-center-breaches-and-prevention</link>
	<author>Dave Klein</author>
	<guid>https://www.akamai.com/blog/security/recent-data-center-breaches-and-prevention</guid>
	<pubDate>Mon, 20 May 2019 11:26:00 UTC</pubDate>

</item>
<item>
	<title>Bots Tampering with TLS to Avoid Detection</title>
	<description>Researchers at Akamai observed attackers using a novel approach for evading detection. This new technique - which we call Cipher Stunting - has become a growing threat, with its roots tracing back to early-2018. By using advanced methods, attackers are...</description>
	<link>https://www.akamai.com/blog/security/bots-tampering-with-tls-to-avoid-detection</link>
	<author>Security Intelligence Response Team</author>
	<guid>https://www.akamai.com/blog/security/bots-tampering-with-tls-to-avoid-detection</guid>
	<pubDate>Wed, 15 May 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Containers vs Virtual Machines – Your Cheat Sheet to Know the Differences</title>
	<description>Containers vs virtual machines is an ongoing debate in many IT shops around the world. Learn what makes each unique, their common use cases, and how to keep both secure.</description>
	<link>https://www.akamai.com/blog/security/containers-vs-virtual-machines-cheat-sheet</link>
	<author>Igor Livshitz</author>
	<guid>https://www.akamai.com/blog/security/containers-vs-virtual-machines-cheat-sheet</guid>
	<pubDate>Tue, 14 May 2019 18:56:00 UTC</pubDate>

</item>
<item>
	<title>Words of Wisdom: Advice for Pursuing a Career in Tech</title>
	<description>The introduction of AI into the workplace is creating uncertainty over the future of employment. However, research shows that tech will create "133 million" more jobs before 2022 than it will dissolve, as "new entities in the economy replace obsolete...</description>
	<link>https://www.akamai.com/blog/culture/words-of-wisdom-advice-for-pursuing-a-career-in-tech</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/words-of-wisdom-advice-for-pursuing-a-career-in-tech</guid>
	<pubDate>Mon, 13 May 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Deployment Diversity for DNS Resiliency</title>
	<description>Similar to diverse workforces performing at a higher level, diverse network service deployments perform at a higher level that is increasingly important as the Internet continues to augment our reality. Akamai has 20 years of edge service deployment experience. Akamai's Intelligent Edge has proven that the "edge" requires more than "servers" on the edge. Fast, intelligent, and secure edge services require a mix of approaches, principles, and designs that start with DNS in mind.</description>
	<link>https://www.akamai.com/blog/security/deployment-diversity-for-dns-resiliency</link>
	<author>Jim Gilbert</author>
	<guid>https://www.akamai.com/blog/security/deployment-diversity-for-dns-resiliency</guid>
	<pubDate>Wed, 08 May 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>The Problem with Perfection: Tech Confidence in Young Girls</title>
	<description>At Akamai, we believe the future of tech is full of amazing opportunities. However, to ensure these opportunities are fulfilled, some things in the industry need to change. To enable these changes, we are committed to providing opportunities to anyone...</description>
	<link>https://www.akamai.com/blog/culture/the-problem-with-perfection-tech-confidence-in-young-girls</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/the-problem-with-perfection-tech-confidence-in-young-girls</guid>
	<pubDate>Wed, 24 Apr 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>The Leaders of the Future: Tech for Growing Minds</title>
	<description>Jobs in the STEM and Tech fields are growing at "three times the pace of non-STEM jobs." The rise of technological advances means the tech industry is not slowing down anytime soon. In the next decade, there will be 1...</description>
	<link>https://www.akamai.com/blog/culture/the-leaders-of-the-future-tech-for-growing-minds</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/the-leaders-of-the-future-tech-for-growing-minds</guid>
	<pubDate>Mon, 08 Apr 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>The AWS Cloud Security Issues You Don’t Want to Ignore</title>
	<description>AWS is the biggest name in IaaS, but the shared responsibility model leaves you open to risk. A full approach to AWS cloud security can fill the gap.</description>
	<link>https://www.akamai.com/blog/security/aws-cloud-security-concerns</link>
	<author>Avishag Daniely</author>
	<guid>https://www.akamai.com/blog/security/aws-cloud-security-concerns</guid>
	<pubDate>Thu, 28 Mar 2019 12:55:00 UTC</pubDate>

</item>
<item>
	<title>Introducing Guardicore Cyber Threat Intelligence</title>
	<description>Introducing Cyber Threat Intelligence (CTI), a freely available resource to assist in identifying and investigating malicious IP addresses and domains.</description>
	<link>https://www.akamai.com/blog/security/introducing-guardicore-cyber-threat-intelligence</link>
	<author>Daniel Goldberg &amp; Ravit Greitser</author>
	<guid>https://www.akamai.com/blog/security/introducing-guardicore-cyber-threat-intelligence</guid>
	<pubDate>Tue, 26 Mar 2019 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Guardicore Threat Intelligence Helps Cybersecurity Community Research Attacks and Mitigate Risks</title>
	<description>This post discusses how Guardicore Labs helps Guardicore customers and the security community enhance their security posture.</description>
	<link>https://www.akamai.com/blog/security/guardicore-threat-intelligence-helps-cybersecurity-community-res</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/security/guardicore-threat-intelligence-helps-cybersecurity-community-res</guid>
	<pubDate>Mon, 25 Mar 2019 15:48:00 UTC</pubDate>

</item>
<item>
	<title>Introducing Ability Purge Cache Tag</title>
	<description>The new purge by cache tag functionality in Akamai’s Fast Purge is now available to all Akamai content delivery product customers. To get to this point, we went through an exciting, year-long beta with more than 200 participants purging ~200,000,000 tags. During this time, we noted some fascinating (and surprising) ways that customers leveraged tags in their caching strategy -- we’ll share our six favorite here. 
</description>
	<link>https://www.akamai.com/blog/developers/introducing-ability-purge-cache-tag</link>
	<author>Sid Phadkar</author>
	<guid>https://www.akamai.com/blog/developers/introducing-ability-purge-cache-tag</guid>
	<pubDate>Sun, 24 Mar 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>5 Docker Security Best Practices to Avoid Breaches</title>
	<description>Like with any technology, Docker too has its security concerns. Learn the Docker security best practices that will help keep your infrastructure and applications secure.</description>
	<link>https://www.akamai.com/blog/security/docker-security-best-practices</link>
	<author>Igor Livshitz</author>
	<guid>https://www.akamai.com/blog/security/docker-security-best-practices</guid>
	<pubDate>Wed, 20 Mar 2019 18:42:00 UTC</pubDate>

</item>
<item>
	<title>Akamai in the Community: Making Tech Accessible</title>
	<description>Here at Akamai, we believe every person is important, and that no one should be left out. Our internal culture is cultivated by looking outwards, into the community, to make the life of our society better. Not only do we...</description>
	<link>https://www.akamai.com/blog/culture/akamai-in-the-community-making-tech-accessible</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/akamai-in-the-community-making-tech-accessible</guid>
	<pubDate>Mon, 18 Mar 2019 04:00:00 UTC</pubDate>

</item>
<item>
	<title>The Voice of Tech: Who We Are, What We Want to Say</title>
	<description>Have you ever wondered what it might be like to see inside one of the biggest tech companies in the world? Well, we're starting a new series of blogs to give you the insight you've never had before. Akamai's innovations...</description>
	<link>https://www.akamai.com/blog/culture/the-voice-of-tech-who-we-are-what-we-want-to-say</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/the-voice-of-tech-who-we-are-what-we-want-to-say</guid>
	<pubDate>Fri, 08 Mar 2019 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Avoiding Security Misconfiguration</title>
	<description>Security Misconfiguration exposes networks to risk on premises and the cloud. What do you need to know to limit firewall security misconfiguration?</description>
	<link>https://www.akamai.com/blog/security/understanding-and-avoiding-security-misconfiguration</link>
	<author>Ron Shahnovsky</author>
	<guid>https://www.akamai.com/blog/security/understanding-and-avoiding-security-misconfiguration</guid>
	<pubDate>Thu, 07 Mar 2019 14:14:00 UTC</pubDate>

</item>
<item>
	<title>Global Traffic Management for Cloud, Data Centers, and CDNs</title>
	<description>Twenty years ago it would be common to have multiple data centers load balanced with specialized devices. The applications in multiple data centers would use the Domain Name System (DNS) to look up the application destination. The DNS system would be set up to with multiple data center locations. This would "round robin" the results between the data centers. If you have four data centers, the customers would get "round-robined" between each data center.</description>
	<link>https://www.akamai.com/blog/security/global-traffic-management-for-cloud-data-centers-and-cdns</link>
	<author>Barry Greene</author>
	<guid>https://www.akamai.com/blog/security/global-traffic-management-for-cloud-data-centers-and-cdns</guid>
	<pubDate>Wed, 06 Mar 2019 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Protecting your Domain Names: Taking the First Steps</title>
	<description>Everyone and everything on the Internet depends on the Domain Name System (DNS) being functional. The DNS has been a common vector for attacks in recent years, and 2019 seems to be no different. Many of these attacks have goals far more sinister than simply taking a company offline or defacing a website; reported attacks include redirecting some or all of an organization's domain to gain access to protected resources, intercept traffic, and even obtain TLS certificates for that domain.  Organizations should perform regular DNS reviews and audits. The following guidelines provide a starting point for your review.</description>
	<link>https://www.akamai.com/blog/security/protecting-your-domain-names-taking-the-first-steps</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/security/protecting-your-domain-names-taking-the-first-steps</guid>
	<pubDate>Thu, 07 Feb 2019 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Phishing Attacks Against Facebook / Google via Google Translate</title>
	<description>When it comes to phishing, criminals put a lot of effort into making their attacks look legitimate, while putting pressure on their victims to take action. In today's post, we're going to examine a recent phishing attempt against me personally....</description>
	<link>https://www.akamai.com/blog/security/phishing-attacks-against-facebook-google-via-google-translate</link>
	<author>Larry Cashdollar</author>
	<guid>https://www.akamai.com/blog/security/phishing-attacks-against-facebook-google-via-google-translate</guid>
	<pubDate>Tue, 05 Feb 2019 05:00:00 UTC</pubDate>

</item>
<item>
	<title>A Vulnerability in Debian’s Apt Allows for Easy Lateral Movement in Data Centers</title>
	<description>Learn about the new vulnerability that was found in Debian’s Advanced Package Tool that allows for easy lateral movement in data center.</description>
	<link>https://www.akamai.com/blog/security/vulnerability-in-debians-advanced-package-tool</link>
	<author>Daniel Goldberg</author>
	<guid>https://www.akamai.com/blog/security/vulnerability-in-debians-advanced-package-tool</guid>
	<pubDate>Wed, 23 Jan 2019 14:00:00 UTC</pubDate>

</item>
<item>
	<title>A Deep Dive into Point of Sale Security</title>
	<description>For many, Point of Sale systems are the weakest link in the IT security chain. Learn the microsegmentation policies that can make a difference.</description>
	<link>https://www.akamai.com/blog/security/understanding-point-of-sale-security</link>
	<author>Ron Shahnovsky</author>
	<guid>https://www.akamai.com/blog/security/understanding-point-of-sale-security</guid>
	<pubDate>Thu, 17 Jan 2019 16:42:00 UTC</pubDate>

</item>
<item>
	<title>Preparing for Y2038 (Already?!)</title>
	<description>It is possible that the need to upgrade and replace systems in the lead-up to 2038 will force the retirement of some remaining IPv4-only systems and networks. </description>
	<link>https://www.akamai.com/blog/performance/preparing-for-y2038-already</link>
	<author>Erik Nygren</author>
	<guid>https://www.akamai.com/blog/performance/preparing-for-y2038-already</guid>
	<pubDate>Thu, 10 Jan 2019 06:32:00 UTC</pubDate>

</item>
<item>
	<title>From the Core to the Edge: 3 Security Imperatives and the Evolving Digital Topology</title>
	<description>The breathtaking pace at which everyone and everything is becoming connected is having a profound effect on digital business, from delivering exceptional experiences, to ensuring the security of your customers, applications, and workforce....</description>
	<link>https://www.akamai.com/blog/security/from-the-core-to-the-edge-3-security-imperatives-and-the-evolving-digital-topology</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/security/from-the-core-to-the-edge-3-security-imperatives-and-the-evolving-digital-topology</guid>
	<pubDate>Sun, 06 Jan 2019 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Life at Akamai: Making Connections</title>
	<description>By the numbers, Akamai's scale, reach and ability to help brands connect users to immersive and immediate online experiences while protecting their businesses from threats, is quite impressive. While I'm proud that Akamai connects with billions of devices daily and...</description>
	<link>https://www.akamai.com/blog/culture/life-at-akamai-making-connections</link>
	<author>Julie Carey</author>
	<guid>https://www.akamai.com/blog/culture/life-at-akamai-making-connections</guid>
	<pubDate>Fri, 04 Jan 2019 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Low, Medium and High Interaction Honeypot Security</title>
	<description>Honeypots are a popular way to protect data centers and learn about attackers. Learn the difference between high and low interaction honeypot security.</description>
	<link>https://www.akamai.com/blog/security/high-interaction-honeypot-versus-low-interaction-honeypot-comparison</link>
	<author>Igor Livshitz</author>
	<guid>https://www.akamai.com/blog/security/high-interaction-honeypot-versus-low-interaction-honeypot-comparison</guid>
	<pubDate>Thu, 03 Jan 2019 19:10:00 UTC</pubDate>

</item>
<item>
	<title>Quiz Phishing: One Scam, 78 Variations</title>
	<description>Over the past year, Akamai Enterprise Threat Research team monitored the usage of one particular phishing toolkit in the wild. We previously wrote about this phishing toolkit  as "Three Questions Quiz". The "Quiz" toolkit is not new to the threat landscape, as its been used in many phishing campaigns in recent years. Our goal here is to present new insights on the evolution and scale of usage of the toolkit in the wild. The most surprising insight was the variety of commercial brands being abused as part of these phishing scams that were  all using the same toolkit, but wearing a different face.</description>
	<link>https://www.akamai.com/blog/security/quiz-phishing--one-scam--78-variations</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/quiz-phishing--one-scam--78-variations</guid>
	<pubDate>Sat, 15 Dec 2018 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Bread And Butter Attacks</title>
	<description>We continuously find that the most basic attack methods that worked ten years ago still work and will probably continue to be effective in the future.</description>
	<link>https://www.akamai.com/blog/security/bread-and-butter-attacks</link>
	<author>Daniel Goldberg &amp; Ofri Ziv</author>
	<guid>https://www.akamai.com/blog/security/bread-and-butter-attacks</guid>
	<pubDate>Thu, 29 Nov 2018 14:00:00 UTC</pubDate>

</item>
<item>
	<title>An Experiment With Reverse Mentoring at Akamai India: Women Mentoring Senior Leaders on Gender Inclusion!</title>
	<description>Rumi said, "Clean out your ears, don't listen for what you already know." And that's exactly what leaders at Akamai India did during the pilot event of Flip, a reverse mentoring event, held earlier this month. High potential women from...</description>
	<link>https://www.akamai.com/blog/culture/an-experiment-with-reverse-mentoring-at-akamai-india-women-mentoring-senior-leaders-on-gender-inclusion</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/an-experiment-with-reverse-mentoring-at-akamai-india-women-mentoring-senior-leaders-on-gender-inclusion</guid>
	<pubDate>Wed, 28 Nov 2018 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Scanning Akamai’s Edge Servers for Vulnerabilities, Correctly</title>
	<description>Continuous monitoring of the Akamai Edge Platform for security vulnerabilities is an integral part of all engineering efforts at Akamai. In addition to our internal vulnerability management program, we engage with third-party assessors to periodically perform external scans of our systems since this is required for compliance with security standards such as PCI DSS and FedRAMP.</description>
	<link>https://www.akamai.com/blog/security/scanning-akamai-s-edge-servers-for-vulnerabilities--correctly</link>
	<author>Kaan Onarlioglu</author>
	<guid>https://www.akamai.com/blog/security/scanning-akamai-s-edge-servers-for-vulnerabilities--correctly</guid>
	<pubDate>Fri, 16 Nov 2018 14:44:00 UTC</pubDate>

</item>
<item>
	<title>Protecting Your Website Visitors from Magecart</title>
	<description>Learn mitigation options that prevent your site from JavaScript skimmer code threats and protects your customers.</description>
	<link>https://www.akamai.com/blog/security/protect-website-visitors-from-megacart</link>
	<author>Ryan Barnett</author>
	<guid>https://www.akamai.com/blog/security/protect-website-visitors-from-megacart</guid>
	<pubDate>Thu, 15 Nov 2018 14:00:00 UTC</pubDate>

</item>
<item>
	<title>How CDN Can Make Your APIs More Powerful</title>
	<description>Companies of all sizes and in every industry use APIs for a staggering range of activities. Just a few examples: APIs make it easy to include weather forecasts in apps, recommend driving routes where you are least likely to have an accident, and allow banks to comply with open banking regulations.</description>
	<link>https://www.akamai.com/blog/developers/how-cdn-can-make-your-apis-more-powerful</link>
	<author>Shantanu Kedar</author>
	<guid>https://www.akamai.com/blog/developers/how-cdn-can-make-your-apis-more-powerful</guid>
	<pubDate>Mon, 12 Nov 2018 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Security Response Headers</title>
	<description>Security response headers are a critical security capability that all organizations should consider.  This blog post is the first in a series that will discuss different security headers and go in-depth with how to configure them for maximum benefit.</description>
	<link>https://www.akamai.com/blog/security/security-response-headers</link>
	<author>Ryan Barnett</author>
	<guid>https://www.akamai.com/blog/security/security-response-headers</guid>
	<pubDate>Wed, 17 Oct 2018 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Domain Name Consolidation: Observations From the Field</title>
	<description>The market and marketing of Web property domain names is changing. Companies prefer to promote top level domains (TLDs), have the option of selecting brand-relevant domain extensions (e.g. SaaS.com), and no longer need country-relevant domains to optimize search engine result rankings. </description>
	<link>https://www.akamai.com/blog/trends/domain-name-consolidation-observations</link>
	<author>Danny Stern</author>
	<guid>https://www.akamai.com/blog/trends/domain-name-consolidation-observations</guid>
	<pubDate>Thu, 06 Sep 2018 20:04:00 UTC</pubDate>

</item>
<item>
	<title>Akamai India's StandTall Program</title>
	<description>Diversity and Inclusion is a mission-critical goal at Akamai. In support of this goal, the India Learning and Development team in collaboration with the Women's Forum India (employee resource group), launched an initiative that aims to foster a culture of...</description>
	<link>https://www.akamai.com/blog/culture/standtall-program-at-akamai</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/standtall-program-at-akamai</guid>
	<pubDate>Thu, 06 Sep 2018 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Giving Back through Danny Lewin Community Care Days</title>
	<description>Akamai was fortunate to have Danny Lewin as a co-founder and role model for our business, our culture, and our sense of adventure and accomplishment. It was Danny who helped to instill the Big Idea that we would change the...</description>
	<link>https://www.akamai.com/blog/culture/danny-lewin-community-care-days</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/culture/danny-lewin-community-care-days</guid>
	<pubDate>Wed, 22 Aug 2018 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Datacenter Traces</title>
	<description>In our research we use actual traces, collected from different production datacenters.</description>
	<link>https://www.akamai.com/blog/security/datacenter-traces</link>
	<author>Akamai</author>
	<guid>https://www.akamai.com/blog/security/datacenter-traces</guid>
	<pubDate>Mon, 06 Aug 2018 13:00:00 UTC</pubDate>

</item>
<item>
	<title>VLAN Network Segmentation – What are The Hidden Costs? </title>
	<description></description>
	<link>https://www.akamai.com/blog/security/hidden-cost-vlan-segmentation</link>
	<author>Ariel Zeitlin</author>
	<guid>https://www.akamai.com/blog/security/hidden-cost-vlan-segmentation</guid>
	<pubDate>Sun, 29 Jul 2018 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Experiment: Improving Page Load Times with Script Streaming</title>
	<description></description>
	<link>https://www.akamai.com/blog/performance/2024/sep/experiment-improving-page-load-times-with-script-streaming</link>
	<author> ugoel@akamai.com (Utkarsh Goel)</author>
	<guid>https://www.akamai.com/blog/performance/2024/sep/experiment-improving-page-load-times-with-script-streaming</guid>
	<pubDate>Tue, 17 Jul 2018 23:55:00 UTC</pubDate>

</item>
<item>
	<title>HTTP+TLS and IPV6-Enablement Both in the Majority for World Cup Streaming</title>
	<description>The underlying protocols of the Internet continue to evolve, and massive events such as the World Cup are a great opportunity to see this in action. </description>
	<link>https://www.akamai.com/blog/performance/http-tls-ipv6-enablement-majority-for-world-cup-streaming</link>
	<author>Erik Nygren</author>
	<guid>https://www.akamai.com/blog/performance/http-tls-ipv6-enablement-majority-for-world-cup-streaming</guid>
	<pubDate>Tue, 17 Jul 2018 13:00:00 UTC</pubDate>

</item>
<item>
	<title>We Are Akamai: What Led Us Here</title>
	<description>About Akamai and the blog We are the people at the heart of the internet. Every day, we work together to protect our customers, deliver ultimate experiences in the digital world, and connect people from far corners of the planet....</description>
	<link>https://www.akamai.com/blog/culture/we-are-akamai-what-led-us-here</link>
	<author>Hema Patel</author>
	<guid>https://www.akamai.com/blog/culture/we-are-akamai-what-led-us-here</guid>
	<pubDate>Thu, 21 Jun 2018 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Six Years Since World IPv6 Launch: Entering the Majority Phases</title>
	<description>While we still have a ways to go before residual users of IPv4 are truly "laggards", we are at a stage where the use of IPv6 should be considered the norm.</description>
	<link>https://www.akamai.com/blog/performance/six-years-since-world-ipv6-launch</link>
	<author>Erik Nygren</author>
	<guid>https://www.akamai.com/blog/performance/six-years-since-world-ipv6-launch</guid>
	<pubDate>Wed, 06 Jun 2018 19:00:00 UTC</pubDate>

</item>
<item>
	<title>Operation Prowli: Monetizing 40,000 Victim Machines</title>
	<description>Operation Prowli: Monetizing 40,000 Victim Machines
</description>
	<link>https://www.akamai.com/blog/security/operation-prowli-traffic-manipulation-cryptocurrency-mining</link>
	<author>Daniel Goldberg, Ofri Ziv &amp; Mor Matalon</author>
	<guid>https://www.akamai.com/blog/security/operation-prowli-traffic-manipulation-cryptocurrency-mining</guid>
	<pubDate>Wed, 06 Jun 2018 17:20:00 UTC</pubDate>

</item>
<item>
	<title>Demystifying API Rate Limiting</title>
	<description>APIs are the “digital glue” that integrates and connects infrastructure, services, devices, and users. With the proliferation of APIs in almost every organization, it‘s essential to have a mechanism in place to manage and govern them. That’s why we introduced Akamai API Gateway, which makes it easier for you to add governance to your APIs.</description>
	<link>https://www.akamai.com/blog/developers/demystifying-api-rate-limiting</link>
	<author>Shantanu Kedar</author>
	<guid>https://www.akamai.com/blog/developers/demystifying-api-rate-limiting</guid>
	<pubDate>Wed, 30 May 2018 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Introducing New WhoAmI Tool DNS Resolver Information</title>
	<description>The Domain Name System (DNS) tools “whoami.akamai.net” and its alias “whoami.akamai.com” have been used for many years, often as a step in the process for diagnosing how a content delivery network (CDN) is directing traffic, locality, and network reachability issues. Whoami was originally introduced as a quick solution that, as often happens, ended up sticking around for far longer than expected.
</description>
	<link>https://www.akamai.com/blog/developers/introducing-new-whoami-tool-dns-resolver-information</link>
	<author>Mario Korf</author>
	<guid>https://www.akamai.com/blog/developers/introducing-new-whoami-tool-dns-resolver-information</guid>
	<pubDate>Wed, 09 May 2018 04:00:00 UTC</pubDate>

</item>
<item>
	<title>How-To: Add Timing-Allow-Origin Header to Improve Your Website Performance Measurements</title>
	<description></description>
	<link>https://www.akamai.com/blog/performance/2024/sep/improve-your-website-performance-measurements</link>
	<author> ugoel@akamai.com (Utkarsh Goel)</author>
	<guid>https://www.akamai.com/blog/performance/2024/sep/improve-your-website-performance-measurements</guid>
	<pubDate>Fri, 27 Apr 2018 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Introducing Web Security Analytics</title>
	<description>Every security team knows that the success of any security product relies heavily on the ability to maintain an optimal security configuration. Any misconfiguration can result in malicious or undesired traffic reaching the application, or worse - legitimate traffic being blocked. In addition, it can result in noisy false positive security events, which can eventually mask real attacks from being detected and blocked. What is Web Security Analytics? Akamai's new Web Security Analytics tool provides a single unified and efficient interface to assess a wide range of security events, perform analysis of events, and evaluate any needed changes in order to maintain an optimal security configuration. For example, customers can use this tool to better:</description>
	<link>https://www.akamai.com/blog/security/introducing-web-security-analytics</link>
	<author>Ori Kanfer</author>
	<guid>https://www.akamai.com/blog/security/introducing-web-security-analytics</guid>
	<pubDate>Sat, 14 Apr 2018 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The Dark Side of APIs: Part 1, API Overview</title>
	<description>Application Programming Interfaces (API) are a software design approach which enables software and system developers to integrate with other systems based on a defined set of communication methods. APIs serve as software building blocks and allow for software reuse - essentially allowing fast development of new systems based on existing capabilities.</description>
	<link>https://www.akamai.com/blog/security/the-dark-side-of-apis--part-1--api-overview</link>
	<author>Ryan Barnett</author>
	<guid>https://www.akamai.com/blog/security/the-dark-side-of-apis--part-1--api-overview</guid>
	<pubDate>Thu, 12 Apr 2018 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Illuminating the Path to Digital Maturity</title>
	<description>Research By Akamai and Forrester Sheds New Light on Digital Experience Challenges and Opportunities Nearly every business today is striving to create and deliver digital experiences that stand apart. But it's no small task turning those visions into reality. Moreover,...</description>
	<link>https://www.akamai.com/blog/news/illuminating-the-path-to-digital-maturity-research-by-akamai-and-forrester-sheds-new-light-on-digital</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/news/illuminating-the-path-to-digital-maturity-research-by-akamai-and-forrester-sheds-new-light-on-digital</guid>
	<pubDate>Wed, 28 Mar 2018 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Recovering Plaintext Passwords from Azure Virtual Machines</title>
	<description>Security design flaw in the VM Access plugin that may enable a cross platform attack impacting every machine type provided by Azure. Read More...</description>
	<link>https://www.akamai.com/blog/security/recovering-plaintext-passwords-azure</link>
	<author>Daniel Goldberg</author>
	<guid>https://www.akamai.com/blog/security/recovering-plaintext-passwords-azure</guid>
	<pubDate>Mon, 19 Mar 2018 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Experiments with Browser Preconnects</title>
	<description></description>
	<link>https://www.akamai.com/blog/performance/2024/sep/experiments-with-browser-preconnects</link>
	<author> ugoel@akamai.com (Utkarsh Goel)</author>
	<guid>https://www.akamai.com/blog/performance/2024/sep/experiments-with-browser-preconnects</guid>
	<pubDate>Thu, 15 Mar 2018 13:00:00 UTC</pubDate>

</item>
<item>
	<title>Your Cache is Exposed</title>
	<description>On February 28, Akamai recorded a 1.35 Tbps DDoS attack against one of our customers. The attack was driven by a relatively new vector, memcached reflection. Possibly the largest publicly disclosed DDoS attack to date, the memcached attack was more than twice the size of the largest DDoS attacks that were launched against an Akamai customer by the operators of the Mirai botnet in September of 2016.</description>
	<link>https://www.akamai.com/blog/security/your-cache-exposed</link>
	<author>Chad Seaman</author>
	<guid>https://www.akamai.com/blog/security/your-cache-exposed</guid>
	<pubDate>Tue, 27 Feb 2018 07:52:00 UTC</pubDate>

</item>
<item>
	<title>Beware of PerformanceTiming.domInteractive</title>
	<description></description>
	<link>https://www.akamai.com/blog/performance/2024/aug/dominteractive-measurement</link>
	<author> ugoel@akamai.com (Utkarsh Goel)</author>
	<guid>https://www.akamai.com/blog/performance/2024/aug/dominteractive-measurement</guid>
	<pubDate>Mon, 04 Dec 2017 14:00:00 UTC</pubDate>

</item>
<item>
	<title>How-To: Replaying Cellular Network Characteristics on Cloud Infrastructure</title>
	<description></description>
	<link>https://www.akamai.com/blog/cloud/2024/aug/replaying-cellular-network-characteristics-on-cloud-infrastructure</link>
	<author> ugoel@akamai.com (Utkarsh Goel)</author>
	<guid>https://www.akamai.com/blog/cloud/2024/aug/replaying-cellular-network-characteristics-on-cloud-infrastructure</guid>
	<pubDate>Mon, 27 Nov 2017 14:00:00 UTC</pubDate>

</item>
<item>
	<title>Introduction to DNS Data Exfiltration</title>
	<description>Written by Asaf Nadler and Avi Aminov Updated 2/14/19 After the initial publication of this blog post, Asaf Nadler and Avi Aminov wrote a paper on the detection of malicious and low throughput data exfiltration over the DNS protocol. The...</description>
	<link>https://www.akamai.com/blog/news/introduction-to-dns-data-exfiltration</link>
	<author>Asaf Nadler</author>
	<guid>https://www.akamai.com/blog/news/introduction-to-dns-data-exfiltration</guid>
	<pubDate>Thu, 21 Sep 2017 04:00:00 UTC</pubDate>

</item>
<item>
	<title>When Looking for SWIFT Audit Guidelines, Beware of the Customer Security Controls Framework</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/beware-swift-customer-security-controls-framework</link>
	<author>Ariel Zeitlin</author>
	<guid>https://www.akamai.com/blog/security/beware-swift-customer-security-controls-framework</guid>
	<pubDate>Tue, 12 Sep 2017 18:37:00 UTC</pubDate>

</item>
<item>
	<title>The WireX Botnet: An Example of Cross-Organizational Cooperation</title>
	<description>On August 17th, 2017, multiple Content Delivery Networks (CDNs) and content providers were subject to significant attacks from a botnet dubbed WireX. The botnet is named for an anagram for one of the delimiter strings in its command and control protocol. The WireX botnet comprises primarily Android devices running malicious applications and is designed to create DDoS traffic. The botnet is sometimes associated with ransom notes to targets.</description>
	<link>https://www.akamai.com/blog/security/example-of-cross-organizational-cooperation</link>
	<author>Akamai InfoSec</author>
	<guid>https://www.akamai.com/blog/security/example-of-cross-organizational-cooperation</guid>
	<pubDate>Mon, 28 Aug 2017 12:05:00 UTC</pubDate>

</item>
<item>
	<title>How to Build Virtual Python Environment</title>
	<description>In the DevOps world, getting a consistent development environment is crucial. In this post, I'll show you how to set up a virtual Python environment and install the correct libraries to achieve a consistent development environment.</description>
	<link>https://www.akamai.com/blog/developers/how-building-virtual-python-environment</link>
	<author>Akshay Ranganath</author>
	<guid>https://www.akamai.com/blog/developers/how-building-virtual-python-environment</guid>
	<pubDate>Wed, 21 Jun 2017 04:00:00 UTC</pubDate>

</item>
<item>
	<title>The Bondnet Army: Questions &amp; Answers</title>
	<description>The following is a select list of questions and answers that we hope will shed more light on the botnet.</description>
	<link>https://www.akamai.com/blog/security/bondnet-army-qnda</link>
	<author>Ravit Greitser</author>
	<guid>https://www.akamai.com/blog/security/bondnet-army-qnda</guid>
	<pubDate>Thu, 11 May 2017 13:00:00 UTC</pubDate>

</item>
<item>
	<title>What You Need to Know About Caching Video Series</title>
	<description>In this "unofficial" video series, Akamai Solutions Engineers Tedd Smith and CJ Arnesen explain the basics of caching: what it is, why it's important, and how to get the most out of it. A great introduction to Akamai, caching, and content delivery network (CDN) basics, this series supplements Akamai Quick Starts and User Guides to help you level set new team members and other departments within your organization. </description>
	<link>https://www.akamai.com/blog/developers/what-you-need-know-about-caching-part-1</link>
	<author>Mario Korf</author>
	<guid>https://www.akamai.com/blog/developers/what-you-need-know-about-caching-part-1</guid>
	<pubDate>Tue, 28 Mar 2017 04:00:00 UTC</pubDate>

</item>
<item>
	<title>SambaCry, the Seven Year Old Samba Vulnerability, is the Next Big Threat (for now)</title>
	<description>As Samba is used as part of many organizations storage systems, we will discuss the impact of the vulnerability on organizations and home users.</description>
	<link>https://www.akamai.com/blog/security/sambacry-seven-year-old-samba</link>
	<author>Daniel Goldberg</author>
	<guid>https://www.akamai.com/blog/security/sambacry-seven-year-old-samba</guid>
	<pubDate>Sat, 25 Mar 2017 13:00:00 UTC</pubDate>

</item>
<item>
	<title>0.2 BTC Strikes Back, Now Attacking MySQL Databases</title>
	<description>In this post we will describe how GGSN detected a wide ransomware attack targeting MySQL databases and provide recommendations on how to protect your database.</description>
	<link>https://www.akamai.com/blog/security/btc-strikes-back-now-attacking-mysql-databases</link>
	<author>Ofri Ziv</author>
	<guid>https://www.akamai.com/blog/security/btc-strikes-back-now-attacking-mysql-databases</guid>
	<pubDate>Fri, 24 Feb 2017 14:00:00 UTC</pubDate>

</item>
<item>
	<title>17 Essential Skills for Performance Engineers</title>
	<description>Most people in the performance engineering field agree that our skillset is derived from an intersection of disciplines that include testing, optimization, and systems engineering. </description>
	<link>https://www.akamai.com/blog/developers/17-essential-skills-for-performance-engineers</link>
	<author>Eric Proegler</author>
	<guid>https://www.akamai.com/blog/developers/17-essential-skills-for-performance-engineers</guid>
	<pubDate>Wed, 11 Jan 2017 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Convenient Mobile Commerce is the Key to Success this Holiday Season</title>
	<description>With the Black Friday, Cyber Monday holiday weekend upon us, retailers in the U.S. and abroad are preparing for another peak period for customer acquisition and commerce revenues. In 2016, the U.S. eCommerce market is the second largest globally and...</description>
	<link>https://www.akamai.com/blog/news/convenient-mobile-commerce-is-the-key-to-success-this-holiday-season</link>
	<author>Ari Weil</author>
	<guid>https://www.akamai.com/blog/news/convenient-mobile-commerce-is-the-key-to-success-this-holiday-season</guid>
	<pubDate>Wed, 23 Nov 2016 05:00:00 UTC</pubDate>

</item>
<item>
	<title>Yes, My Name is ||</title>
	<description>Different cultures and nationalities have different naming conventions; I came from a one that led me to face the universe with a personal name "Or". I fact, my name has different meanings in different languages. In English the meaning of "Or" is function word that indicate alternatives and in computer coding languages the name "Or" is being used as Boolean operator that enable us to write conditions in our code. </description>
	<link>https://www.akamai.com/blog/security/yes--my-name-is---</link>
	<author>Or Katz</author>
	<guid>https://www.akamai.com/blog/security/yes--my-name-is---</guid>
	<pubDate>Thu, 03 Nov 2016 07:00:00 UTC</pubDate>

</item>
<item>
	<title>Planning for the End of 2016: A Leap Second and the End-of-Support for SHA-1 TLS Certificates</title>
	<description>A leap second and the final end of browser support for SHA-1 TLS certificates will happen and can potentially break software systems and applications.  </description>
	<link>https://www.akamai.com/blog/security/the-end-of-support-for-sha-tls-certificates</link>
	<author>Erik Nygren</author>
	<guid>https://www.akamai.com/blog/security/the-end-of-support-for-sha-tls-certificates</guid>
	<pubDate>Wed, 02 Nov 2016 13:00:00 UTC</pubDate>

</item>
<item>
	<title>The PhotoMiner Campaign</title>
	<description>In this report we will share our research on the PhotoMiner’s timelines, infection strategies, C&amp;C servers and provide tools to help detect the malware.</description>
	<link>https://www.akamai.com/blog/security/the-photominer-campaign</link>
	<author>Daniel Goldberg</author>
	<guid>https://www.akamai.com/blog/security/the-photominer-campaign</guid>
	<pubDate>Tue, 14 Jun 2016 13:00:00 UTC</pubDate>

</item>
<item>
	<title>How to Report Your Performance Test Results Like a Pro</title>
	<description>Performance tests try to reduce the risks of downtime or outages on multi-user systems by conducting experiments that use load to reveal limitations and errors in the system. Testing usually involves assessing the performance and capacity of systems that were expensive and time-consuming to build.</description>
	<link>https://www.akamai.com/blog/developers/how-to-report-your-performance-test-results-like-a-pro</link>
	<author>Eric Proegler</author>
	<guid>https://www.akamai.com/blog/developers/how-to-report-your-performance-test-results-like-a-pro</guid>
	<pubDate>Wed, 20 Apr 2016 04:00:00 UTC</pubDate>

</item>
<item>
	<title>Revealing Guardicore Reveal™</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/revealing-guardicore-reveal</link>
	<author>Lior Neudorfer</author>
	<guid>https://www.akamai.com/blog/security/revealing-guardicore-reveal</guid>
	<pubDate>Fri, 04 Mar 2016 10:46:00 UTC</pubDate>

</item>
<item>
	<title>Redirecting On the Edge</title>
	<description>On the web, every second counts. Service engineers and operations teams are looking for ways to save milliseconds from web pages' load times. One of the simpler ways to squeeze better performance from web pages already using a Content Delivery Network (CDN) is to move the redirection responses from origin to the edge.</description>
	<link>https://www.akamai.com/blog/developers/redirecting-on-the-edge</link>
	<author>Danny Stern</author>
	<guid>https://www.akamai.com/blog/developers/redirecting-on-the-edge</guid>
	<pubDate>Fri, 12 Feb 2016 21:08:00 UTC</pubDate>

</item>
<item>
	<title>Data Center Ransomware</title>
	<description></description>
	<link>https://www.akamai.com/blog/security/data-center-ransomware</link>
	<author>Misha Yaverbaum</author>
	<guid>https://www.akamai.com/blog/security/data-center-ransomware</guid>
	<pubDate>Mon, 20 Jul 2015 11:20:00 UTC</pubDate>

</item>
<item>
	<title>Launching Forward with IPv6</title>
	<description>With the era of freely available IPv4 addresses nearing its end, I'm pleased to see that 2012 appears to be the year when the IPv6 Internet will finally reach maturity and launch into wide-scale commercial use.  For over a decade, the groundwork for the migration to version 6 of the Internet Protocol (IPv6) has been built, with changes to operating systems, client and server software, routers, and Internet backbone networks.  To-date, however, the availability of IPv6 content and end-users has remained slim with few Web sites being available over IPv6 and with just over 0.5% of global Internet users having IPv6 connectivity that their machines will elect to use.  </description>
	<link>https://www.akamai.com/blog/performance/launching-forward-with-ipv6</link>
	<author>Erik Nygren</author>
	<guid>https://www.akamai.com/blog/performance/launching-forward-with-ipv6</guid>
	<pubDate>Fri, 01 Jun 2012 01:52:00 UTC</pubDate>

</item>
<item>
	<title>Keep Your Tech Flame Alive: Trailblazer Rachel Bayley</title>
	<description>In this Akamai FLAME Trailblazer blog post, Rachel Bayley encourages women to step into the unknown and to be their authentic selves.</description>
	<link>https://www.akamai.com/blog/culture/2024/may/keep-your-tech-flame-alive-trailblazer-rachel-bayley</link>
	<author>Akamai FLAME Team</author>
	<guid>https://www.akamai.com/blog/culture/2024/may/keep-your-tech-flame-alive-trailblazer-rachel-bayley</guid>
	<pubDate></pubDate>

</item>
<item>
	<title>Threats Making WAVs - Incident Response to a Cryptomining Attack</title>
	<description>Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files. The report includes the full attack vectors, from detection, infection, network propagation and malware analysis and recommendations for optimizing incident response processes in data centers.</description>
	<link>https://www.akamai.com/blog/security/threats-making-wavs-incident-reponse-cryptomining-attack</link>
	<author>Guardicore Labs Team</author>
	<guid>https://www.akamai.com/blog/security/threats-making-wavs-incident-reponse-cryptomining-attack</guid>
	<pubDate></pubDate>

</item>
<item>
	<title>The Oracle of Delphi Will Steal Your Credentials</title>
	<description>Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The attacks brute forced passwords for RDP credentials to connect to the victim download and execute a previously undetected malware, which we named Trojan.sysscan.</description>
	<link>https://www.akamai.com/blog/security/the-oracle-of-delphi-steal-your-credentials</link>
	<author>Daniel Goldberg</author>
	<guid>https://www.akamai.com/blog/security/the-oracle-of-delphi-steal-your-credentials</guid>
	<pubDate></pubDate>

</item>
<item>
	<title>The Nansh0u Campaign – Hackers Arsenal Grows Stronger</title>
	<description>In the beginning of April, three attacks detected in the Guardicore Global Sensor Network (GGSN) caught our attention. All three had source IP addresses originating in South-Africa and hosted by VolumeDrive ISP (see IoCs).</description>
	<link>https://www.akamai.com/blog/security/the-nansh0u-campaign-hackers-arsenal-grows-stronger</link>
	<author>Ophir Harpaz &amp; Daniel Goldberg</author>
	<guid>https://www.akamai.com/blog/security/the-nansh0u-campaign-hackers-arsenal-grows-stronger</guid>
	<pubDate></pubDate>

</item>
<item>
	<title>PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers</title>
	<description>Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.
</description>
	<link>https://www.akamai.com/blog/security/please-read-me-opportunistic-ransomware-devastating-mysql-servers</link>
	<author>Ophir Harpaz</author>
	<guid>https://www.akamai.com/blog/security/please-read-me-opportunistic-ransomware-devastating-mysql-servers</guid>
	<pubDate></pubDate>

</item>

</channel>
</rss>
