The Akamai Blog
API Security: Best Practices for API Activity Data Acquisition
1 year 10 months ago
Abigail Ojeda
Integrating mPulse’s Beacon API with EdgeWorkers to Visualize All Client Requests
1 year 10 months ago
Akamai mPulse combines with Akamai EdgeWorkers to visualize any client request and uses its http-request module to let users send their own requests.
Hitoshi Kaneko
Reduce API Security Risk by Fixing Runtime Threats in Code Faster
1 year 10 months ago
Abigail Ojeda
Akamai’s Perspective on January’s Patch Tuesday 2024
1 year 10 months ago
Akamai Security Intelligence Group
Noname Security Platform Updates: 3.25 Release
1 year 10 months ago
Stas Neyman
You Had Me at Hi — Mirai-Based NoaBot Makes an Appearance
1 year 10 months ago
Stiv Kupchik
How Edge Computing Is Transforming Healthcare
1 year 11 months ago
There are myriad ways the healthcare and life sciences ecosystem benefits from edge computing. Read about the top five use cases for edge computing in healthcare.
Carley Thornell
Make Git Your Single Source of Truth for Application and Infrastructure Delivery
1 year 11 months ago
Billy Thompson
A Retrospective on DDoS Trends in 2023 and Actionable Strategies for 2024
1 year 11 months ago
Sven Dummer & Sandeep Rath
Safeguarding Patient Health Data Means Balancing Access and Security
1 year 11 months ago
Increased access to health data can leave providers and insurers vulnerable to data breaches, so it’s vital to invest in cybersecurity that can protect networks.
Carley Thornell
Customize Deployments with Akamai's Metadata Service
1 year 11 months ago
Akamai
Weaponizing DHCP DNS Spoofing — A Hands-On Guide
1 year 11 months ago
Ori David
Akamai’s Responsibility to Our Enterprise Customers
1 year 11 months ago
Adam Karon
Noname Security Platform Updates: 3.24 Release
1 year 11 months ago
Stas Neyman
The Do’s and Don’ts of Modern API Security
1 year 11 months ago
Abigail Ojeda
Women Can Make a Difference in the Field of Data Science
1 year 11 months ago
Tashema Nichols-Jones
Novel Detection of Process Injection Using Network Anomalies
1 year 11 months ago
Ofir Shen
Insights from Survey of Financial Services Cyber Leaders in Asia-Pacific
1 year 11 months ago
Cheryl Chiodi
Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 2
1 year 11 months ago
Ben Barnea
Checked
8 hours 49 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed