Akamai

29/08/2023

Ransomware on the Move: Evolving Exploitation Techniques and the Active Pursuit of Zero-Days

Learn about the global #cybersecurity united front addressing the #ransomware threat and highlighting techniques to better protect organizations. New State of the Internet report examines the ransomware landscape, which demonstrates […]
05/06/2023

Akamai Hunt: Product Brief

Hunt the Most Evasive Threats. A security service to detect and remediate threats and risks. Capitalize on the infrastructure of Akamai Guardicore Segmentation and Akamai’s global […]
02/06/2023

NetStorage: Product Brief

Learn how NetStorage meets the demands of online content delivery with features that simplify and optimize cloud-based online storage.
02/06/2023

Cloud Wrapper: Product Brief

Cloud Wrapper optimizes connectivity between cloud infrastructures and the Akamai Intelligent Edge to maximize origin offload and reduce cloud egress costs.
06/10/2022

What Is a DDoS Attack?

DDoS, or distributed denial of service, is a type of cyberattack that tries to make a website or network resource unavailable by flooding it with malicious […]
06/10/2022

Cloud Computing Services

Cloud Computing Services Features and Benefits By now most people have heard about cloud computing services, but what does cloud mean? While cloud services may vary in […]
06/10/2022

What is a CDN

A content delivery network (CDN) is a group of geographically distributed servers that speed up the delivery of web content by bringing it closer to where […]
06/10/2022

Lateral Movement Explained

What is lateral movement? Lateral movement is the set of techniques that attackers use to gain access to additional assets after they have initially penetrated network […]
06/10/2022

What is microsegmentation?

What is microsegmentation? Microsegmentation is an emerging security best practice that offers several advantages over more established approaches like network segmentation and application segmentation. The traditional […]
06/10/2022

Zero Trust security model

What is Zero Trust? Zero Trust is a network security model based on a philosophy that no person or device inside or outside of an organization’s network should […]
06/10/2022

Memcached DDoS Explained

A Memcached Distributed Denial of Service (DDoS) attack is a cyber attack aimed at Memcached, a database caching system designed to speed up websites and networks. It works […]
06/10/2022

Streaming Media Services

Demand for streaming media services is growing quickly, presenting content providers with new revenue opportunities and new technical challenges as well. Consumers expect instant and uninterrupted […]
Tiếng Việt