The Akamai Blog
Fortify Your Network Security from Emerging Geopolitical Cyberthreats
3 weeks 4 days ago
Sandeep Rath, Nitin Singla, Ankita Kharya & Ryan Gao
RSAC 2026: Tag in a Partner for the AI Security Showdown
3 weeks 4 days ago
Legacy security wasn't built for autonomous AI. See how Akamai partners are stepping into the ring to build trust and secure the agentic enterprise.
Nick Watkins
Build Serverless Functions with Zero Cold Starts: WebAssembly and Spin
3 weeks 5 days ago
Thorsten Hans
The Mistral–Koyeb Deal and the Shift Toward Architectural Maturity in AI
3 weeks 6 days ago
Vineeth Varughese
Inside Akamai: How Offload and Performance Drive Speed and Resiliency
3 weeks 6 days ago
Patrick Saweikis
Avoid Evasive Scraping with Stronger Content Protection
4 weeks ago
Learn about the enhancements to Akamai Content Protector that stop evasive scraping across web and mobile while minimizing user friction and false positives.
Emily Lyons
Build Transformative Security with AI-Powered WAF Detections
4 weeks ago
Danielle Walter
Role-Based Access Control (RBAC) Now Available in Akamai Cloud
4 weeks 1 day ago
George Zhukovsky
How Harmonic Proved High-Performance AI Inference on Akamai GPUs
1 month ago
Find out how Harmonic achieved high-performance AI inference on Akamai Cloud with NVIDIA Blackwell GPUs, optimizing for speed and efficiency.
Danielle Cook
Why GPU Card Counts Matter for Real AI Workloads
1 month ago
Stay ahead with NVIDIA RTX PRO™ 6000 Blackwell Server Edition GPUs in the Akamai Inference Cloud. Discover the right GPU shape for your AI needs.
Arshad Khan
Choose the Right GPU on Akamai Cloud for Your AI Workload
1 month ago
Arshad Khan
Post-Quantum Cryptography Beyond TLS: Remain Quantum Safe
1 month ago
Jan Schaumann
Zerobot Malware Targets n8n Automation Platform
1 month 1 week ago
The use of Mirai continues. Read how the Akamai SIRT identified active exploitation of vulnerabilities in the n8n automation platform and Tenda AC1206 routers.
Kyle Lefton
Cleaner Compute: Akamai Adds 128 MW of Renewable Energy to the Grid
1 month 1 week ago
Margot Hines
Accelerate Digital Service Delivery in Government Agencies
1 month 1 week ago
Joe Henry
When Uptime Is Non-Negotiable: Rethinking Zero Trust for OT Environments
1 month 1 week ago
Clint Huffaker
CVE-2026-26365: Incorrect processing of “Connection: Transfer-Encoding”
1 month 2 weeks ago
Akamai InfoSec
Inside the Fix: Analysis of In-the-Wild Exploit of CVE-2026-21513
1 month 2 weeks ago
Read how PatchDiff-AI uncovered the root cause of CVE-2026-21513 — an actively exploited MSHTML vulnerability — and how APT28 leveraged it in real-world attacks.
Maor Dahan
Adapt, Protect, and Extend: How Partners Can Help Orgs Unlock ROI from AI
1 month 2 weeks ago
Ari Weil
Checked
3 hours 4 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed