Funneling Bits, Foiling Hackers

Greenberg, Andy
July 2010
Forbes Asia;Jul2010, Vol. 6 Issue 8, p45
The article reports on Akamai Technologies Inc., a high-speed data network, founded by Thomas Leighton in 1998. Akamai is responsible for accelerating the content delivery of the world's most popular websites. In 2009, Akamai earned a profit of 145 million dollars on 860 million dollars in revenue. In December 2009, the company launched a firewall for its customers for the purpose of monitoring cloud-based software. Since 2000, the company has been combating cybercriminals.


Related Articles

  • Security info costs. Rapoza, Jim // eWeek;9/27/2004, Vol. 21 Issue 39, p56 

    This article focuses on computer security information services. In the general Internet security community, the premier early warning computer security service happens all the time. In fact, most people consider it standard operating procedure, and everyone from major vendors such as Microsoft...

  • Clamp down. Crowley, Aileen // PC Week;4/10/95, Vol. 12 Issue 14, pE/7 

    Presents information on topics related to computer security. Includes EyeDentify Inc.'s EyeDentify 2001 retinal-recognition device; Security breaches on the Internet; Steps to network security; Management Analytics Inc.'s network security check-up; Statistics on computer-related crime in the...

  • Businesses should not rely on one partner, as Akamai attacks prove. Mohamed, Arif // Computer Weekly;6/29/2004, p36 

    Akamai denial of service attack highlights weakness of the internet. The recent attack on web hosting firm Akamai caused disruption to the websites and businesses of many blue-chip customers, drawing attention to the vulnerability of the internet infrastructure. Users who rely on third parties,...

  • Estonian cyber-war highlights civilian vulnerabilities. Evron, Gadi // eWeek;8/13/2007, Vol. 24 Issue 26, p34 

    The article reports on the cooperative effort that prevented attacks from the cyber-war in Estonia, which highlights civilian vulnerabilities. It is stated that the online attacks against Estonian Web sites are being referred to as the first Internet war, in which simple folks may end up as the...

  • Multi-Defense-Resistant Spam.  // Software World;Sep2006, Vol. 37 Issue 5, p25 

    The article explains that Network Box Security Response warns the computer industry about a type of unsolicited electronic mail message that is resistant to multiple computer security and computer network security defenses. The messages are difficult to filter and block because they lack a...

  • Akamai to speed up the Web, or your money back. Hohman, Robin Schreier // Network World;06/21/99, Vol. 16 Issue 25, p8 

    Features Cambridge, Massachusetts-based Web hosting company Akamai Technologies. Company background; Services offered.

  • Akamai offers custom content. Jacobs, April // Network World;07/03/2000, Vol. 17 Issue 27, p21 

    Announces that United States-based content delivery provider Akamai is offering enterprise users a service for their electronic commerce and Web sites that will enable them to determine the location and types of network users. Firms that have signed up for the Akamai service; Value of...

  • FIREWALL FOLLIES. Garfinkel, Simson // Technology Review;Sep2002, Vol. 105 Issue 7, p33 

    Focuses on the concept of firewalls for computer networks which are installed by businesses to protect their networks from hackers and intruders. Inability of firewalls to protect networks against the damages insiders can inflict; Impact of firewalls on Internet accessibility; Advantages and...

  • Security threats increase demand for protection. Savvas, Antony // Computer Weekly;4/20/2004, p51 

    The information technology (IT) industry calls for security standard for business continuity. The threat of attacks has fuelled the market for IT security professionals. With internet security attacks on the increase and events such as the BT cabling tunnel fire in Manchester, IT security and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics