Tag: Blog

Akamai API Security Enhancements

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai API Security Enhancements

What Are the Benefits of a Microservices Architecture?

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: What Are the Benefits of a Microservices Architecture?

It?s All In the Cards: Preventing Payment Abuse for Retailers

Carding attacks have become a serious challenge for retailers. Learn how Akamai Account Protector can help organizations defend against payment abuse. This article has been indexed from Blog Read the original article: It?s All In the Cards: Preventing Payment Abuse…

What Is DNSSEC, and How Does It Work?

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: What Is DNSSEC, and How Does It Work?

Imperva Customers Are Protected Against CVE-2025-31161 in CrushFTP

Introduction A critical security vulnerability, identified as CVE-2025-31161 (previously tracked as CVE-2025-2825), has been discovered in CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0. This flaw allows unauthenticated remote attackers to access unpatched CrushFTP servers if they’re publicly exposed…

The Database Kill Chain

Modern attacks targeting sensitive data have become complex. An organization with many assets might be lost when trying to assess its overall risk, understand the pain points and prioritize the tasks required to secure its information systems. Cyber threat modeling…

The 2025 WAF Wave from the Other Side

Forrester just published its 2025 Web application Firewall Wave. As a former industry analyst, and as a contributor on the vendor side for Imperva (cough, a leader in the report, cough), let me share some reactions on the shape of…

Anatomy of a SYN-ACK Attack

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Anatomy of a SYN-ACK Attack

The 2025 WAF Wave from the Other Side

Forrester just published its 2025 Web application Firewall Wave. As a former industry analyst, and as a contributor on the vendor side for Imperva (cough, a leader in the report, cough), let me share some reactions on the shape of…

Akamai Wins Best Sales Leadership Development Program from Brandon Hall

Learn how Akamai’s award-winning sales leadership development program transforms sales managers into impactful coaches, driving growth and performance. This article has been indexed from Blog Read the original article: Akamai Wins Best Sales Leadership Development Program from Brandon Hall

Akamai?s Channel-First Strategy: Driving Partner Success in 2025

Customer success is Akamai?s priority ? and our many industry awards highlight how we’ve empowered our partners to thrive. See what we have planned for 2025. This article has been indexed from Blog Read the original article: Akamai?s Channel-First Strategy:…

Why AI Demands a New Security Playbook

Understand the new AI security threats and how Akamai can help you develop a risk mitigation strategy. This article has been indexed from Blog Read the original article: Why AI Demands a New Security Playbook