The Akamai Blog
Operationalize Day-2 Services for API Security and Microsegmentation
4 months 1 week ago
Learn how to turn post-deployment services into a revenue opportunity and provide ongoing value for your customers with industry-leading tools and service playbooks.
Adam Mittler
Commitment to Powering Europe’s Digital Sovereignty and Competitiveness
4 months 1 week ago
Akamai remains committed to supporting our customers’ European digital sovereignty with our suite of robust, secure, and high-performing solutions.
Natalie Billingham
Dangling Danger: Why You Need to Focus on Your DNS Posture Management
4 months 1 week ago
Tony Lauro
The Paradigm Shift: From Traditional APIs to Language-Driven Integration
4 months 2 weeks ago
Large language models (LLMs) are changing the game, offering a new way for systems to interact based on understanding language, not just strict formats.
James Brown
Study Reveals API Security Gaps in Asia-Pacific Compliance Programs
4 months 2 weeks ago
Reuben Koh
Keep Your Tech FLAME Alive: Akamai Trailblazer Maite Vitar
4 months 2 weeks ago
Akamai FLAME Team
Cryptominers’ Anatomy: Shutting Down Mining Botnets
4 months 2 weeks ago
Maor Dahan
Improve Your Security with Attack Insights in Web Security Analytics
4 months 2 weeks ago
Danielle Walter
Building a Quantum-Safe Internet: The IETF's Plan for TLS
4 months 3 weeks ago
Learn about the latest initiatives in post-quantum cryptography, including the IETF’s plan for securing TLS.
Rich Salz
Enhancements to Akamai API Security, Q2 2025
4 months 3 weeks ago
Akamai API Security updates 3.48 and 3.49 include Compliance Dashboard enhancements, integration with Zuplo API gateway, and expanded sensor coverage.
Stas Neyman
API Security Under Federal Scrutiny: A Wake-Up Call for CIOs
4 months 4 weeks ago
Stas Neyman
Secure Your Enterprise with Robust DNS: A Guide to NIST SP 800-81r3
5 months ago
Jim Black
Enhance Your Edge Native Apps with Low Latency Using Multiple EdgeWorkers
5 months ago
Learn how Flexible Composition lets you seamlessly deploy multiple EdgeWorkers in a single request for easier-to-build, scalable, edge native applications.
Hitoshi Kaneko & Yo Nishiyama
Beyond Implementation: Building a Zero Trust Strategy That Works
5 months ago
Shivangi Sahu
Two Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability
5 months ago
Kyle Lefton & Daniel Messing
Innovation, Not Infrastructure: Akamai’s Managed Cloud Services
5 months 1 week ago
Ari Weil
Introducing New Networking Capabilities for LKE-Enterprise
5 months 1 week ago
Modern enterprise applications require a robust, scalable, and secure networking infrastructure.
Prasoon Pushkar
Fog Computing vs. Edge Computing: Their Roles in Modern Technology
5 months 1 week ago
Fog computing vs. edge computing: Understand how they compare, their unique benefits, and which is best for your data processing needs in IoT and beyond.
Mike Elissen
Navigating the Future of Scope 2: Balancing Impact and Practicality
5 months 1 week ago
The Greenhouse Gas Protocol’s Scope 2 revisions demand thoughtful action. Read how we’re prioritizing meaningful, measurable impact over rapid progress.
Mike Mattera
Checked
1 hour 28 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed