Akamai Enables Post-Quantum Cryptography on the Edge The Akamai Blog 3 months 3 weeks ago Learn about the latest development in our post-quantum journey: Support for post-quantum cryptography on the Akamai edge. Jan Schaumann
These 4 Threats to AI Applications Require New Cybersecurity Strategies The Akamai Blog 4 months ago Learn about the four threat categories that today’s cybersecurity teams must address to protect their companies’ AI investments. Swati Kumar
CVE-2025-54142: HTTP Request Smuggling via OPTIONS + Body The Akamai Blog 4 months ago Learn how Akamai InfoSec mitigated CVE-2025-54142 — an HTTP request smuggling vulnerability arising from OPTIONS requests with a body. Akamai InfoSec
BadSuccessor Is Dead, Long Live BadSuccessor(?) The Akamai Blog 4 months ago Read about Microsoft’s patch for BadSuccessor — a vulnerability in Windows Server Active Directory — and learn why its underlying mechanics still matter. Yuval Gordon
Protect Critical Infrastructure: Cybersecurity Strategies for Governments The Akamai Blog 4 months ago Learn actionable strategies that can help state and local governments protect critical infrastructure and dramatically reduce risk exposure. Douglas Holland
Our New Premium Managed Databases Plan for Resource-Intensive Workloads The Akamai Blog 4 months ago Peter Sari (Peter Sari)
Boost EdgeWorker Observability: Set Up Logging With DataStream The Akamai Blog 4 months ago AJ Johnson
Marginal Emissions Rates: See Carbon Emissions with Clarity in Real Time The Akamai Blog 4 months ago Learn how Akamai is using marginal emissions rates to improve the transparency and accuracy of our emissions accounting. Katie Robinson
A New Way to Manage Property Configurations: Dynamic Rule Updates The Akamai Blog 4 months 1 week ago Karthik Prabhu
Key Takeaways from KubeCon + CloudNativeCon India 2025 The Akamai Blog 4 months 1 week ago Prasoon Pushkar
Stop LLM Attacks: How Security Helps AI Apps Achieve Their ROI The Akamai Blog 4 months 1 week ago AI security is a business problem. Protect your LLM application investment and ROI by connecting your security team with business stakeholders. Christine Ferrusi Ross
Akamai Beats Other WAAP Vendors in Third-Party Evaluation The Akamai Blog 4 months 1 week ago Danielle Walter
Accelerating Secure Enterprise Kubernetes Adoption The Akamai Blog 4 months 1 week ago Learn how LKE-E solves critical problems while providing streamlined adoption, operational simplicity, and cost efficiency at scale. Patrick Jamal
How Cloud Wrapper Evolved to Optimize Small-Object Caching The Akamai Blog 4 months 1 week ago Learn how Akamai's Cloud Wrapper evolved to optimize small-object caching, reduce egress costs, and boost SEO rankings for web and media assets. Ansley Flanagan
Akamai Named an Overall Leader for API Security by KuppingerCole The Akamai Blog 4 months 2 weeks ago Stas Neyman
The Edge of Agency: Defending Against the Risks of Agentic AI The Akamai Blog 4 months 2 weeks ago Maxim Zavodchik
The Reality of Modern Cyberattacks: Lessons from Recent Retail Breaches The Akamai Blog 4 months 2 weeks ago Jim Black
Generative Personalization at the Edge: The Future of E‑Commerce Isn’t (Just) in the Cloud The Akamai Blog 4 months 2 weeks ago Pedro Salvado