The Akamai Blog
Improve Your Security with Attack Insights in Web Security Analytics
1 month 3 weeks ago
Danielle Walter
Building a Quantum-Safe Internet: The IETF's Plan for TLS
2 months ago
Learn about the latest initiatives in post-quantum cryptography, including the IETF?s plan for securing TLS.
Rich Salz
Enhancements to Akamai API Security, Q2 2025
2 months ago
Akamai API Security updates 3.48 and 3.49 include Compliance Dashboard enhancements, integration with Zuplo API gateway, and expanded sensor coverage.
Stas Neyman
API Security Under Federal Scrutiny: A Wake-Up Call for CIOs
2 months 1 week ago
Stas Neyman
Secure Your Enterprise with Robust DNS: A Guide to NIST SP 800-81r3
2 months 1 week ago
Jim Black
Enhance Your Edge Native Apps with Low Latency Using Multiple EdgeWorkers
2 months 1 week ago
Learn how Flexible Composition lets you seamlessly deploy multiple EdgeWorkers in a single request for easier-to-build, scalable, edge native applications.
Hitoshi Kaneko & Yo Nishiyama
Beyond Implementation: Building a Zero Trust Strategy That Works
2 months 1 week ago
Shivangi Sahu
Two Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability
2 months 1 week ago
Kyle Lefton & Daniel Messing
Innovation, Not Infrastructure: Akamai?s Managed Cloud Services
2 months 2 weeks ago
Ari Weil
Fog Computing vs. Edge Computing: Their Roles in Modern Technology
2 months 2 weeks ago
Fog computing vs. edge computing: Understand how they compare, their unique benefits, and which is best for your data processing needs in IoT and beyond.
Mike Elissen
Navigating the Future of Scope 2: Balancing Impact and Practicality
2 months 2 weeks ago
The Greenhouse Gas Protocol?s Scope 2 revisions demand thoughtful action. Read how we?re prioritizing meaningful, measurable impact over rapid progress.
Mike Mattera
Fog Computing vs. Edge Computing: Their Roles in Modern Technology
2 months 2 weeks ago
Fog computing vs. edge computing: Understand how they compare, their unique benefits, and which is best for your data processing needs in IoT and beyond.
Mike Elissen
Why It?s Time to Retire Traditional VPNs, Part 1
2 months 2 weeks ago
Elad Lev & Jim Black
Honoring Innovation, Growth, and Collaboration: The Akamai Partner Awards
2 months 2 weeks ago
Introducing the Akamai Partner Awards, which recognize excellence ? both organizational and individual ? in sales, services, marketing, and technical impact.
Prince Jason Albert
Introducing Akamai DNS Posture Management
2 months 2 weeks ago
Sandra Murphy
The Akamai Innovation Tour: A Journey in Perspective and Partnership
2 months 3 weeks ago
?What does innovation mean to you?? Read how one marketer answered that question after attending the 2025 Akamai Innovation Tour.
Nick Watkins
Damage Control: Why Building Cyber Resilience Is Non-Negotiable
2 months 3 weeks ago
It?s only a matter of time before attackers find a crack in your security armour. Learn how to combine resilience with compliance and protect what matters most.
Richard Meeus
AI in Cybersecurity: How AI Is Impacting the Fight Against Cybercrime
2 months 4 weeks ago
AI is transforming cybersecurity. Explore how hackers use AI for cybercrimes and how cybersecurity experts use AI to prevent, detect, and respond to attacks.
Christine Ferrusi Ross
Forget Perfect Prevention ? Build Cyber Resilience Instead
2 months 4 weeks ago
Discover why shifting from cyberattack prevention to cyber resilience is the key to survival in today?s relentless cyberthreat landscape.
Brent Maynard
Checked
2 hours 39 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed