The Akamai Blog
Accelerating Secure Enterprise Kubernetes Adoption
2 days 11 hours ago
Learn how LKE-E solves critical problems while providing streamlined adoption, operational simplicity, and cost efficiency at scale.
Patrick Jamal
Akamai Named an Overall Leader for API Security by KuppingerCole
5 days 14 hours ago
Stas Neyman
The Edge of Agency: Defending Against the Risks of Agentic AI
5 days 20 hours ago
Maxim Zavodchik
The Reality of Modern Cyberattacks: Lessons from Recent Retail Breaches
6 days 14 hours ago
Jim Black
Akamai and Bitmovin: Revolutionizing Live and On-Demand Video Streaming
1 week ago
Discover how Akamai and Bitmovin?s partnership reduces costs, enhances performance, and delivers personalized video experiences to content providers.
Adam Massaro
A Coordinated Response to MadeYouReset HTTP/2 Protocol Attacks
1 week ago
Mike Bishop
From Discovery to Testing: Akamai and Snyk Deliver Seamless API Security
1 week 1 day ago
Stas Neyman
Visualize Security Success with the Security Summary Dashboard
1 week 2 days ago
Jim Black
CVE-2025-32094: HTTP Request Smuggling Via OPTIONS + Obsolete Line Folding
2 weeks ago
In March 2025, Akamai received a bug bounty report identifying an HTTP Request Smuggling vulnerability that was quickly resolved for all customers.
Akamai InfoSec
Post-Quantum Cryptography Implementation Considerations in TLS
2 weeks ago
Jan Schaumann
AI in Cloud Computing: How AI Is Revolutionizing the Landscape
2 weeks 1 day ago
Discover how AI in cloud computing is transforming industries. Learn about the differences between cloud AI and edge AI ? their benefits, use cases, and solutions.
Pavel Despot
Why the Right Tool ? and the Right Team ? Are Essential for DNS Security
2 weeks 2 days ago
Derek Hammack
Gartner Market Guide: Microsegmentation for Zero Trust and Resilience
2 weeks 5 days ago
Shivangi Sahu
3 Key Areas to Focus on When You're Evaluating AI Security
2 weeks 5 days ago
Berk Veral
Publishers: How to Block AI Bots and Reclaim Control of Your Content
3 weeks ago
Mani Sundaram
The Price of Poor Cybersecurity in 2024: US$3.1 Billion
3 weeks ago
Jim Black
Surviving the Ransomware Gauntlet: A Test of Resilience
3 weeks 1 day ago
Tricia Howard & Maria Vlasak
Beyond Perimeter Defense: Implementing Zero Trust in Federal Agencies
3 weeks 5 days ago
Learn how to address cybersecurity in this new perimeter-less world and get six steps to achieving Least Permissive Trust for federal agencies.
Micah Maryn
CISA Recommends Segmentation & Zero Trust to Combat Interlock Ransomware
3 weeks 6 days ago
Jacob Abrams
Checked
1 hour 2 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed