The Akamai Blog
Anatomy of a SYN-ACK Attack
16 hours 22 minutes ago
Chad Seaman
Enhancing Public Sector Cybersecurity with Akamai API Security
5 days 9 hours ago
Learn how Akamai's API security solution helps federal agencies identify, protect, and monitor API traffic in real time.
Stephen Ringo
To Meet Compliance Challenges, Focus on Building Great Security
5 days 16 hours ago
Tony Lauro
Emissions Transparency: Moving Toward a More Rigorous Verification
6 days 16 hours ago
Katie Robinson
Akamai Wins Best Sales Leadership Development Program from Brandon Hall
1 week ago
Learn how Akamai's award-winning sales leadership development program transforms sales managers into impactful coaches, driving growth and performance.
Chelsey Pine
Akamai?s Channel-First Strategy: Driving Partner Success in 2025
1 week 1 day ago
Customer success is Akamai?s priority ? and our many industry awards highlight how we've empowered our partners to thrive. See what we have planned for 2025.
Janki Kaura
Detecting and Mitigating an Authorization Bypass Vulnerability in Next.js
1 week 1 day ago
Akamai Security Intelligence Group
Why AI Demands a New Security Playbook
1 week 4 days ago
Understand the new AI security threats and how Akamai can help you develop a risk mitigation strategy.
Rupesh Chokshi
Akamai Named a Leader in the Latest Forrester Report for WAF Solutions
1 week 5 days ago
Danielle Walter
Detecting and Mitigating Apache Tomcat CVE-2025-24813
1 week 5 days ago
Akamai Security Intelligence Group
The Hidden Costs and Ethical Pitfalls of Content Scraping
1 week 6 days ago
Read about the significant hidden costs and ethical pitfalls of content scraping ? and learn how to protect your website.
Jagdish Mohite
Cryptominers? Anatomy: Analyzing Cryptominers
1 week 6 days ago
Maor Dahan
Negative Exposure: Edimax Network Cameras Used to Spread Mirai
2 weeks 5 days ago
Mirai continues to plague organizations. Read how the Akamai SIRT identified a new command injection vulnerability that?s targeting Edimax devices.
Kyle Lefton & Larry Cashdollar
Detecting and Mitigating the Apache Camel Vulnerabilities
3 weeks ago
Akamai researchers have created detection scripts and additional details for the Apache Camel vulnerabilities CVE-2025-27636 and CVE-2025-29891.
Akamai Security Intelligence Group
From Good to Great: Mastering Day-2 Network Security Policy
3 weeks ago
Zohar Furman
Magecart: How Akamai Protected a Global Retailer Against a Live Attack
3 weeks 4 days ago
Gal Meiri
Why Are Airlines a Prime Target for Cyberattacks?
4 weeks ago
Jim Black & Eric Rubenov
Lightning-Fast Requests with Early Data
1 month ago
Robin Marx & Rafal Myszka
Strengthening Our Emissions Accounting Process Blog
1 month ago
Margot Hines
Checked
1 hour 22 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed