Accelerating Secure Enterprise Kubernetes Adoption The Akamai Blog 2 days 7 hours ago Learn how LKE-E solves critical problems while providing streamlined adoption, operational simplicity, and cost efficiency at scale. Patrick Jamal
Akamai Named an Overall Leader for API Security by KuppingerCole The Akamai Blog 5 days 10 hours ago Stas Neyman
The Edge of Agency: Defending Against the Risks of Agentic AI The Akamai Blog 5 days 16 hours ago Maxim Zavodchik
The Reality of Modern Cyberattacks: Lessons from Recent Retail Breaches The Akamai Blog 6 days 10 hours ago Jim Black
Akamai and Bitmovin: Revolutionizing Live and On-Demand Video Streaming The Akamai Blog 1 week ago Discover how Akamai and Bitmovin?s partnership reduces costs, enhances performance, and delivers personalized video experiences to content providers. Adam Massaro
A Coordinated Response to MadeYouReset HTTP/2 Protocol Attacks The Akamai Blog 1 week ago Mike Bishop
From Discovery to Testing: Akamai and Snyk Deliver Seamless API Security The Akamai Blog 1 week 1 day ago Stas Neyman
Visualize Security Success with the Security Summary Dashboard The Akamai Blog 1 week 2 days ago Jim Black
CVE-2025-32094: HTTP Request Smuggling Via OPTIONS + Obsolete Line Folding The Akamai Blog 2 weeks ago In March 2025, Akamai received a bug bounty report identifying an HTTP Request Smuggling vulnerability that was quickly resolved for all customers. Akamai InfoSec
Post-Quantum Cryptography Implementation Considerations in TLS The Akamai Blog 2 weeks ago Jan Schaumann
AI in Cloud Computing: How AI Is Revolutionizing the Landscape The Akamai Blog 2 weeks 1 day ago Discover how AI in cloud computing is transforming industries. Learn about the differences between cloud AI and edge AI ? their benefits, use cases, and solutions. Pavel Despot
Why the Right Tool ? and the Right Team ? Are Essential for DNS Security The Akamai Blog 2 weeks 2 days ago Derek Hammack
Gartner Market Guide: Microsegmentation for Zero Trust and Resilience The Akamai Blog 2 weeks 5 days ago Shivangi Sahu
3 Key Areas to Focus on When You're Evaluating AI Security The Akamai Blog 2 weeks 5 days ago Berk Veral
Publishers: How to Block AI Bots and Reclaim Control of Your Content The Akamai Blog 3 weeks ago Mani Sundaram
Surviving the Ransomware Gauntlet: A Test of Resilience The Akamai Blog 3 weeks 1 day ago Tricia Howard & Maria Vlasak
Beyond Perimeter Defense: Implementing Zero Trust in Federal Agencies The Akamai Blog 3 weeks 5 days ago Learn how to address cybersecurity in this new perimeter-less world and get six steps to achieving Least Permissive Trust for federal agencies. Micah Maryn
CISA Recommends Segmentation & Zero Trust to Combat Interlock Ransomware The Akamai Blog 3 weeks 6 days ago Jacob Abrams
Coyote in the Wild: First-Ever Malware That Abuses UI Automation The Akamai Blog 4 weeks 1 day ago Tomer Peled