The Akamai Blog
Locked Out and Held for Ransom: A City's Battle Against Cybercrime
11 months 4 weeks ago
Read how having a plan and doing some preparation in advance can lessen the severity of a ransomware attack — or prevent one altogether.
Douglas Holland
Comparing Video Processing Units (VPUs), GPUs, and CPUs
1 year ago
More users than ever subscribe to on-demand media streaming and engage with live streaming video over the internet, rather than broadcast television.
Maddie Presland
Unlock New Growth Opportunities with Akamai Campaign Builder
1 year ago
Gabriela Grigoras
A DDoS Attack Just Breached Your Defenses — Now What?
1 year ago
Bruce Van Nice, Sandeep Rath, Dennis Birchard & Gabriel Bellas
Introducing Linode Interfaces: Better Network Management (Open Beta)
1 year ago
Join the beta for Linode Interfaces, a new network management tool offering clearer configurations, better security, and smarter routing.
Prasoon Pushkar
WebAssembly Jobs and CronJobs in Kubernetes with SpinKube & the Spin Command Trigger
1 year ago
Learn how to run WebAssembly workloads as Kubernetes Jobs and CronJobs using SpinKube and the Spin command trigger
Thorsten Hans
Gain Deeper Visibility into Risks to Meet Security Compliance Demands
1 year ago
John Natale
Creating A Clear Cloud with Account Service Limits and Quotas
1 year ago
Maddie Presland
Kubernetes IngressNightmare: Wake Up and Fight Back with Microsegmentation
1 year ago
Discover how to defend Kubernetes from Ingress vulnerabilities with microsegmentation and Zero Trust security from Akamai. Stay protected — inside and out.
Yaniv Zadok & Jacob Abrams
Here Comes Mirai: IoT Devices RSVP to Active Exploitation
1 year ago
Kyle Lefton
Authoring Custom Spin Templates
1 year ago
Learn how to create, distribute, and install custom templates for Spin CLI to boost developer productivity and meet regulatory compliance.
Thorsten Hans
Distributed AI Inference: Strategies for Success
1 year ago
Vineeth Varughese
Bolster Your Regulatory Compliance with Layered Security Measures
1 year ago
John Natale
Optimize Application Performance Across Germany with New Berlin Distributed Region
1 year ago
Maddie Presland
Spin JS/TS Router Showdown: Hono vs Itty vs Manual Routing
1 year ago
A performance comparison of three routing approaches in Spin JS/TS apps — Hono, Itty, and manual routing — with benchmarks and guidance.
Thorsten Hans
Akamai Firewall for AI: Get Powerful Protection for New LLM App Threats
1 year ago
Protect against LLM attacks such as prompt injection, exfiltration and extraction, and toxic AI outputs with Akamai Firewall for AI.
Christine Ferrusi Ross
Combat Rising Account Abuse: Akamai and Ping Identity Partner Up
1 year ago
Emily Lyons
Portability and Developer Control: 5 Key Takeaways from NAB 2025
1 year ago
Pavel Despot
AI Is Starting to Flex Its Network Security Muscles
1 year ago
Garrett Weber
Checked
17 hours 29 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed