The Akamai Blog
Deployments to Dollars: Turning Services into Recurring Revenue
5 months ago
Adam Mittler
A Sustainability Program with Regional Nuance
5 months ago
Owen Mattison
The AI-Powered Reboot: Rethinking Defense for Web Apps and APIs
5 months ago
Tricia Howard
Helping Our Customers Develop a Sustainability Strategy
5 months ago
Owen Mattison
Data Is on the Menu — and AI’s Market Price Is High
5 months 1 week ago
Tricia Howard
Akamai API Security Enhancements
5 months 1 week ago
Stas Neyman
API Security Is Key to Cyber Resilience in Media and Entertainment
5 months 1 week ago
For media and entertainment companies, API expansion means a broader attack surface. Security needs to stay a step ahead.
Beata Majek-Adamczyk
What Are the Benefits of a Microservices Architecture?
5 months 1 week ago
Pavel Despot
Sharing Is (Not) Caring: How Shared Credentials Open the Door to Breaches
5 months 1 week ago
Tomer Peled
Cloud Migration Strategy: The Step-By-Step Framework and Benefits
5 months 2 weeks ago
Pavel Despot
What Is DNSSEC, and How Does It Work?
5 months 2 weeks ago
Sam Preston
It’s All in the Cards: Preventing Payment Abuse for Retailers
5 months 2 weeks ago
Carding attacks have become a serious challenge for retailers. Learn how Akamai Account Protector can help organizations defend against payment abuse.
Emily Lyons
Consistent Security Everywhere: Akamai Makes Leading WAF Technology CDN-Agnostic
5 months 2 weeks ago
Danielle Walter
Critical Linux RCE Vulnerability in CUPS — What We Know and How to Prepare
5 months 2 weeks ago
Akamai Security Intelligence Group
DDoS Attack Trends in 2024 Signify That Sophistication Overshadows Size
5 months 2 weeks ago
Sven Dummer, Dennis Birchard, Sandeep Rath & Bruce Van Nice
Speed with Precision: Early and Accurate Response to Apache Camel CVEs
5 months 2 weeks ago
Danielle Walter & Tim Cote
Cloud for the Streaming Era: Introducing Accelerated Compute
5 months 3 weeks ago
Maddie Presland
Unlocking the Next Wave of Edge Computing with Serverless WebAssembly
5 months 3 weeks ago
Brent Eiler & Matt Butcher
Anatomy of a SYN-ACK Attack
5 months 3 weeks ago
Chad Seaman
Checked
2 hours 43 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed