channel company logo

Akamai EMEA

Power and Protect Life Online

Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every
day. Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther
  • 22,870 Subscribers
  • 191 talks
  • 5 series

Power and Protect Life Online

Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every
day. Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther
  • 22,870 Subscribers
  • 191 talks
  • 5 series

Upcoming talks

SIG Download: Episode 17 - Spring-Cleaning for Cybersecurity: Eliminating Hidden Risks

SIG Download: Episode 17 - Spring-Cleaning for Cybersecurity: Eliminating Hidden Risks

Just like spring-cleaning refreshes your home, it’s time to declutter your cybersecurity strategy. Hidden risks — unused access, outdated controls, and
misconfigured assets — can quietly expand your attack surface. Join us for Episode 17 of The SIG Download as host Tricia Howard and special guest Maor
Dahan break down the latest threats from the past 30 days. They’ll also share expert insights on eliminating security blind spots, reducing attack surfaces, …

The Cloud-Powered Enterprise: Creating Business Value

The Cloud-Powered Enterprise: Creating Business Value

Discover how cloud technology is transforming industries, accelerating growth, and enhancing competitiveness in this insightful EcoCast. Join industry experts
as they explore the strategic advantages of cloud adoption, from streamlining operations to driving innovation and efficiency. Key Takeaways: - Strategic
Cloud Adoption – Learn how businesses leverage the cloud to enhance operations and drive innovation. - Cloud Migration Best Practices – Explore effective…

Hybrid/Public/Private Clouds: Which Cloud is Right for Your Infrastructure?

Hybrid/Public/Private Clouds: Which Cloud is Right for Your Infrastructure?

Navigating the complex landscape of cloud solutions is a critical decision with far-reaching implications for your business. Understanding the strengths and
trade-offs of hybrid, public, and private clouds is essential to building a strategy that aligns with your organisation’s needs. Join us for this insightful EcoCast,
where top experts from leading cloud providers will explore the advantages and key considerations of each cloud model. Discover practical tools, tips, and …

On-demand talks

API Trends Across Borders: Comparing Germany, UK, and The United States in Akamai's API Impact Report

API Trends Across Borders: Comparing Germany, UK, and The United States in Akamai's API Impact
Report

Explore the key findings from Akamai’s 2024 API Impact Report, which examines critical trends in API usage and security across Germany, the UK, and the
USA. As APIs increasingly dominate web traffic, they have become prime targets for cyber threats such as credential stuffing, bot-driven attacks, and data
exfiltration. In this on-demand session, we analyse the rapid growth of API traffic, the surge in API abuse, and how attack patterns vary across key global re…

Why Successful Enterprises Are Real-Time Businesses

Why Successful Enterprises Are Real-Time Businesses

To thrive, enterprises must become real-time businesses. According to an MIT | CISR study, companies excelling in ‘real-time-ness’ achieve 62% higher
revenue growth and 97% higher profit margins. Enterprises need to leverage AI to address critical events in real-time, but centralised cloud architectures
pose challenges in a distributed business. How can they harness real-time intelligence to drive operational efficiency and growth in this context? Join Bryan …

State of Cloud 2025: Navigating EMEA’s Cloud Revolution

State of Cloud 2025: Navigating EMEA’s Cloud Revolution

Watch our on-demand panel discussion with Bryan Glick, Editor in Chief at Computer Weekly, as we explore the key trends shaping cloud innovation in 2025.
Discover how AI integration, edge-native applications, and distributed cloud are transforming strategies across EMEA. Gain actionable insights on application
modernisation, cost optimisation, and real-world success stories to help your organisation thrive. Key Takeaways: - How regional challenges are driving clou…

SIG Download: Episode 16 - Valentine Weak Spots: Securing the Heart of Your Enterprise

SIG Download: Episode 16 - Valentine Weak Spots: Securing the Heart of Your Enterprise

In this episode Tricia rejoins her special guest from Episode 15, Senior Security Researcher Sam Tinklenberg, who chats about new vulnerabilities, including
cross-site scripting, why it is definitely not dead, and provides tips on how to secure against it.

The Year in Review 2024: Today’s Insights, Tomorrow’s Outlook

The Year in Review 2024: Today’s Insights, Tomorrow’s Outlook

From the return of the Mirai botnet to the takedown of Anonymous Sudan, there was plenty going on in cybersecurity in 2024. Six experts recently offered up
their review of the past year and revealed what they think security teams need to prepare for in 2025. Join our webinar as three of those experts expand on
their findings and get updates on trends like: • Nation-state attacks by proxy • Triple extortion attacks • A rise in API attacks • How AI will change security • …

SIG Download: Episode 15 - Into the Storm: 2025 Cyber Threats Uncovered

SIG Download: Episode 15 - Into the Storm: 2025 Cyber Threats Uncovered

In this episode Tricia chats about authentication libraries with Akamai security researcher Sam Tinklenberg. Listen as they cover open source, SAML
vulnerabilities, signature wrapping, and more.

SIG Download: Episode 14 - Fa-la-la-la-Linux: Process Injection Isn’t Just for Windows

SIG Download: Episode 14 - Fa-la-la-la-Linux: Process Injection Isn’t Just for Windows

In this episode Tricia chats with Akamai security researcher Ori David. Their discussions cover process injection attacks, the Linux attack surface, and how to
protect it, Don't miss these crucial insights into the latest cybersecurity threats!

Securing Your Cloud with Hydrolix

Securing Your Cloud with Hydrolix

In today's digital landscape, securing cloud environments is essential to safeguarding enterprise operations. This event is tailored for IT professionals and
decision-makers dedicated to fortifying their organization's cloud infrastructure. Participants will dive into cutting-edge strategies and technologies for cloud
security, covering key areas such as identity and access management, data encryption, threat detection, and security posture management. Industry exper…

Series