The Akamai Blog
Will VPN Security Vulnerabilities Accelerate ZTNA Adoption?
2 years ago
Andrew Terranova & Tommy Cormier
CVE-2023-50387 and CVE-2023-50868 — DNS Exploit KeyTrap Posed Major Internet Threat
2 years ago
Ralf Weber, Jan Schaumann & Bruce Van Nice
What’s Next for Akamai’s Cloud Computing Strategy
2 years ago
Tom Leighton
Scanning Activity for CVE-2024-22024 (XXE) Vulnerability in Ivanti
2 years ago
Sam Tinklenberg & Noam Atias
Say Goodbye to Monolithic EdgeWorkers: Introducing Flexible Composition (Part 2)
2 years ago
Evan Hughes & AJ Johnson
Data Matters — Is Your API Security Data Rich or Data Poor?
2 years ago
Taking a data-rich approach to security is the most effective way to stay a step ahead of today’s quickly evolving API threats.
Abigail Ojeda
The AnyDesk Breach: Overview and Recommendations
2 years 1 month ago
Akamai Security Intelligence Group
Akamai Named an Overall Leader for Zero Trust Network Access
2 years 1 month ago
Jim Black
The Web Scraping Problem, Part 3: Protecting Against Botnets
2 years 1 month ago
David Sénécal
Stop Scrapers and Scalpers with Akamai Content Protector
2 years 1 month ago
Christine Ferrusi Ross
What to Do When Your VPN Provider Suffers from Zero-Day Vulnerabilities
2 years 1 month ago
Jim Black
The Web Scraping Problem, Part 2: Use Cases that Require Scraping
2 years 1 month ago
David Sénécal
Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal
2 years 1 month ago
Ori David
The Noname Security 3.26 Release Supports Integration with Fastly
2 years 1 month ago
Stas Neyman
How Akamai Volunteers Helped Restore Costa Rica’s Most Polluted Beach
2 years 1 month ago
Braulio Rojas
The Web Scraping Problem: Part 1
2 years 1 month ago
David Sénécal
Actively Exploited Vulnerability in Hitron DVRs: Fixed, Patches Available
2 years 1 month ago
Aline Eliovich, Kyle Lefton, Chad Seaman & Larry Cashdollar
Keep Your Tech FLAME Alive
2 years 1 month ago
Natalie Billingham
Worried About Bot Attacks on B2C APIs? You May Be Missing a Bigger Risk
2 years 1 month ago
Abigail Ojeda
Checked
11 hours 30 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed