The Akamai Blog
Active Exploitation: New Aquabot Variant Phones Home
2 months 2 weeks ago
Kyle Lefton & Larry Cashdollar
Continuing the Sustainability Conversation
2 months 2 weeks ago
Mike Mattera
Exploit Me, Baby, One More Time: Command Injection in Kubernetes Log Query
2 months 2 weeks ago
A vulnerability in Kubernetes allows remote code execution. Read how abusing Log Query can lead to a complete takeover of all Windows nodes in a cluster.
Tomer Peled
DNS Silently Powers the Internet
2 months 3 weeks ago
As a part of almost every internet transaction, the Domain Name System is powerful, lightweight, and ubiquitous ? and delivers value for a modest investment.
Bruce Van Nice
Akamai Named a Major Player in IDC MarketScape: Worldwide Public Cloud IaaS 2025 Assessment
2 months 4 weeks ago
Ari Weil
Akamai API Security Release 3.41
2 months 4 weeks ago
Stas Neyman
Akamai?s Tailored Approach to Net Zero
2 months 4 weeks ago
Mike Mattera
Data Security: Challenges, Solutions, and the Path Forward
3 months ago
Learn why a more proactive, integrated, and dynamic approach to data security is crucial to effectively safeguard your business in today?s digital landscape.
Jagdish Mohite
Making an Impact: Beach Cleanup and Reforestation Event
3 months 1 week ago
Akamai volunteers in Costa Rica came together to remove trash from the beach and plant trees ? and they learned how their everyday choices affect the planet.
Braulio Rojas
Major Enhancements to Akamai API Security, Q4 2024
3 months 3 weeks ago
The Akamai API Security updates 3.38, 3.39, and 3.40 include configurable blocking, the automatic creation of posture findings from runtime incidents, and more.
Stas Neyman
Protecting Unmanaged Devices with Armis and Akamai
3 months 3 weeks ago
Jacob Abrams
DigiEver Fix That IoT Thing!
3 months 3 weeks ago
Kyle Lefton, Daniel Messing & Larry Cashdollar
AVANT and Akamai: Solving Security Challenges for Financial Services
3 months 3 weeks ago
Read why AVANT?s Trusted Advisors recommend to their clients Akamai?s award-winning solutions in cloud computing, cybersecurity, and application protection.
Kathleen Moore
The Benefits of Serverless Computing Architecture
3 months 3 weeks ago
Mike Elissen
Empowering Women in Cybersecurity: Lessons from the FS-ISAC Women?s Networking Event
3 months 3 weeks ago
Discover strategies for empowering women in cybersecurity, gleaned from lessons learned at the 2024 FS-ISAC women?s networking event.
Lisa Beegle
Akamai?s Perspective on December?s Patch Tuesday 2024
4 months ago
Akamai Security Intelligence Group
Akamai Technical Academy and Coursera: A Year of STEM Education Success
4 months ago
Carrie Bergman, Jamie Ng & Shirley Jiang
What To Do When You?re Under a DDoS Attack: A Guide to Action
4 months ago
Sven Dummer & Sandeep Rath
Teaching an Old Framework New Tricks: The Dangers of Windows UI Automation
4 months ago
Tomer Peled
Checked
6 hours 37 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed