The Akamai Blog
Visualize Security Success with the Security Summary Dashboard
3 months ago
Jim Black
CVE-2025-32094: HTTP Request Smuggling Via OPTIONS + Obsolete Line Folding
3 months ago
In March 2025, Akamai received a bug bounty report identifying an HTTP Request Smuggling vulnerability that was quickly resolved for all customers.
Akamai InfoSec
Post-Quantum Cryptography Implementation Considerations in TLS
3 months 1 week ago
Jan Schaumann
AI in Cloud Computing: How AI Is Revolutionizing the Landscape
3 months 1 week ago
Discover how AI in cloud computing is transforming industries. Learn about the differences between cloud AI and edge AI — their benefits, use cases, and solutions.
Pavel Despot
Open Source & Fully Managed: Aiven-Powered Databases on Akamai
3 months 1 week ago
Peter Sari (Peter Sari)
Why the Right Tool — and the Right Team — Are Essential for DNS Security
3 months 1 week ago
Derek Hammack
Why AI Systems Use Vector Databases to Improve Performance and Reduce Costs
3 months 1 week ago
Amit Mohanty
Gartner Market Guide: Microsegmentation for Zero Trust and Resilience
3 months 1 week ago
Shivangi Sahu
3 Key Areas to Focus on When You're Evaluating AI Security
3 months 1 week ago
Berk Veral
Publishers: How to Block AI Bots and Reclaim Control of Your Content
3 months 1 week ago
Mani Sundaram
The Price of Poor Cybersecurity in 2024: US$3.1 Billion
3 months 1 week ago
Jim Black
Surviving the Ransomware Gauntlet: A Test of Resilience
3 months 2 weeks ago
Tricia Howard & Maria Vlasak
Beyond Perimeter Defense: Implementing Zero Trust in Federal Agencies
3 months 2 weeks ago
Learn how to address cybersecurity in this new perimeter-less world and get six steps to achieving Least Permissive Trust for federal agencies.
Micah Maryn
CISA Recommends Segmentation & Zero Trust to Combat Interlock Ransomware
3 months 2 weeks ago
Jacob Abrams
Coyote in the Wild: First-Ever Malware That Abuses UI Automation
3 months 3 weeks ago
Tomer Peled
Understand the SharePoint RCE: Exploitations, Detections, and Mitigations
3 months 3 weeks ago
Akamai Security Intelligence Group
Why Customer Experience Is the New Battleground in Zero Trust
3 months 3 weeks ago
Learn why being named a Customer Favorite in Forrester's Zero Trust Wave reveals what we believe really matters in cybersecurity.
Jim Black
Why Observability Tools Tend to Fail at Scale
3 months 3 weeks ago
Observability is no longer just about catching errors or checking if a server is up. In modern distributed systems, it’s about understanding behavior across dozens, if not thousands, of services, all running in different environments and generating massive amounts of data.
Swati Kumar
How Search Engines, LLMs, and Third-Party Scrapers Affect Bot Management
3 months 3 weeks ago
Christine Ferrusi Ross
Checked
1 hour 28 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed