The Akamai Blog
Active Exploitation: New Aquabot Variant Phones Home
1 year ago
Kyle Lefton & Larry Cashdollar
Continuing the Sustainability Conversation
1 year ago
Mike Mattera
Exploit Me, Baby, One More Time: Command Injection in Kubernetes Log Query
1 year ago
A vulnerability in Kubernetes allows remote code execution. Read how abusing Log Query can lead to a complete takeover of all Windows nodes in a cluster.
Tomer Peled
Exploit Me, Baby, One More Time: Command Injection in Kubernetes Log Query
1 year ago
A vulnerability in Kubernetes allows remote code execution. Read how abusing Log Query can lead to a complete takeover of all Windows nodes in a cluster.
Tomer Peled
You Can’t Improve What You Can’t See: API Monitoring Is Crucial
1 year ago
Mayur Upadhyaya
DNS Silently Powers the Internet
1 year ago
As a part of almost every internet transaction, the Domain Name System is powerful, lightweight, and ubiquitous — and delivers value for a modest investment.
Bruce Van Nice
Akamai Named a Major Player in IDC MarketScape: Worldwide Public Cloud IaaS 2025 Assessment
1 year ago
Ari Weil
Akamai API Security Release 3.41
1 year ago
Stas Neyman
Akamai’s Tailored Approach to Net Zero
1 year ago
Mike Mattera
Live Streaming with Akamai’s Distributed Compute Regions
1 year ago
Nazir Kabani
Object Storage Use Cases in Focus: New Endpoints for Higher Capacity and Speed
1 year ago
Peter Sari (Peter Sari)
Data Security: Challenges, Solutions, and the Path Forward
1 year 1 month ago
Learn why a more proactive, integrated, and dynamic approach to data security is crucial to effectively safeguard your business in today’s digital landscape.
Jagdish Mohite
How Your Business Can Benefit From Combining a DAM and CDN
1 year 1 month ago
Jean-François Lecas
Making an Impact: Beach Cleanup and Reforestation Event
1 year 1 month ago
Akamai volunteers in Costa Rica came together to remove trash from the beach and plant trees — and they learned how their everyday choices affect the planet.
Braulio Rojas
Major Enhancements to Akamai API Security, Q4 2024
1 year 1 month ago
The Akamai API Security updates 3.38, 3.39, and 3.40 include configurable blocking, the automatic creation of posture findings from runtime incidents, and more.
Stas Neyman
Protecting Unmanaged Devices with Armis and Akamai
1 year 1 month ago
Jacob Abrams
DigiEver Fix That IoT Thing!
1 year 1 month ago
Kyle Lefton, Daniel Messing & Larry Cashdollar
AVANT and Akamai: Solving Security Challenges for Financial Services
1 year 1 month ago
Read why AVANT’s Trusted Advisors recommend to their clients Akamai’s award-winning solutions in cloud computing, cybersecurity, and application protection.
Kathleen Moore
The Benefits of Serverless Computing Architecture
1 year 1 month ago
Mike Elissen
Checked
12 hours 38 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed