The Akamai Blog
More Power at the Edge: Introducing Distributed Compute Regions
1 year 5 months ago
For edge-native applications, performance is closely tied to the location of cloud services.
Maddie Presland
Five Ways to Prevent and Protect Against Ransomware Attacks
1 year 5 months ago
Jacob Abrams
Akamai’s Perspective on November’s Patch Tuesday 2024
1 year 5 months ago
Akamai Security Intelligence Group
Akamai Managed Database Services: Powered by Aiven
1 year 5 months ago
Akamai has partnered with Aiven, a leading global managed database provider, to offer customers a streamlined way to offload the complexities of database setup, configuration, patching, backups, and scaling.
Peter Sari (Peter Sari)
The Definitive Guide to Linux Process Injection
1 year 5 months ago
Ori David
Study Reveals Security Teams Feel the Impact of Rising API Threats
1 year 6 months ago
API abuse is increasing at an alarming rate. Read this post to learn the four areas of focus for organizations that are seeking to protect their APIs.
Rupesh Chokshi
Getting Started with Akamai App Platform
1 year 6 months ago
Step-by-step instructions to provision a Kubernetes cluster with Akamai App Platform enabled and then build, deploy and publicly expose an application.
Sander Rodenhuis (Sander Rodenhuis)
Introducing the Akamai App Platform
1 year 6 months ago
Over the past decade, developers have been forced to choose between two evils: either accept Big Cloud’s complexity, costs, and lock-in, or struggle and lose precious time building everything from scratch. Like code itself, it was a binary decision.
Ari Weil
Observing Spin Apps with OpenTelemetry and the .NET Aspire Dashboard
1 year 6 months ago
Observe Spin apps locally using automatic instrumentation, the otel plug-in, and the .NET Aspire dashboard for logs, metrics, and traces.
Thorsten Hans
Finding Solutions to Meet PCI DSS v4.0 Requirements 6.4.3 and 11.6.1
1 year 6 months ago
Boris Kirzner
Akamai's Behavioral DDoS Engine: A Breakthrough in Modern DDoS Mitigation
1 year 6 months ago
As digital infrastructure grows, so do the threats posed by DDoS attacks. See how the Akamai Behavioral DDoS Engine can keep your business online.
Aseem Ahmed & Abdeslam Bella
Rails Without Derails: Thwarting Code Injection Attacks
1 year 6 months ago
Sam Tinklenberg, Maxim Zavodchik & Aparna Mandal
Rails Without Derails: Thwarting Code Injection Attacks
1 year 6 months ago
Sam Tinklenberg, Maxim Zavodchik & Aparna Mandal
Exploring Artificial Intelligence: Is AI Overhyped?
1 year 6 months ago
Dive into AI technologies like inference, deep learning, and generative models to learn how LLMs and AI are transforming cybersecurity and tech industries.
Berk Veral
How Ransomware Is Delivered and How to Prevent Attacks
1 year 6 months ago
Jacob Abrams
In the Dark about Shadow APIs?
1 year 6 months ago
I’m often asked about shadow APIs and shadow API parameters—even by people with a lot of experience in the API development space.
Alex Leung
6 Steps for Cyber Resilience During the 2024 U.S. Presidential Election
1 year 6 months ago
Learn about the risks to service availability during the 2024 U.S. presidential election — and the six steps you can take now to ensure your cyber resilience.
Ryan Gao
Beyond the Login — Keeping Accounts Secure with Lifecycle Protection
1 year 6 months ago
Emily Lyons
Bad Bots: 6 Common Bot Attacks and Why They Happen
1 year 6 months ago
Learn about the different types of bot attacks, why they happen, and how to protect your website from these threats with effective bot mitigation strategies.
Christine Ferrusi Ross
Checked
2 hours 23 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed