The Akamai Blog
Building a Quantum-Safe Internet: The IETF's Plan for TLS
9 months 2 weeks ago
Learn about the latest initiatives in post-quantum cryptography, including the IETF’s plan for securing TLS.
Rich Salz
Enhancements to Akamai API Security, Q2 2025
9 months 3 weeks ago
Akamai API Security updates 3.48 and 3.49 include Compliance Dashboard enhancements, integration with Zuplo API gateway, and expanded sensor coverage.
Stas Neyman
API Security Under Federal Scrutiny: A Wake-Up Call for CIOs
9 months 3 weeks ago
Stas Neyman
Secure Your Enterprise with Robust DNS: A Guide to NIST SP 800-81r3
9 months 3 weeks ago
Jim Black
Enhance Your Edge Native Apps with Low Latency Using Multiple EdgeWorkers
9 months 3 weeks ago
Learn how Flexible Composition lets you seamlessly deploy multiple EdgeWorkers in a single request for easier-to-build, scalable, edge native applications.
Hitoshi Kaneko & Yo Nishiyama
Beyond Implementation: Building a Zero Trust Strategy That Works
9 months 3 weeks ago
Shivangi Sahu
Two Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability
9 months 4 weeks ago
Kyle Lefton & Daniel Messing
Innovation, Not Infrastructure: Akamai’s Managed Cloud Services
10 months ago
Ari Weil
Introducing New Networking Capabilities for LKE-Enterprise
10 months ago
Modern enterprise applications require a robust, scalable, and secure networking infrastructure.
Prasoon Pushkar
Fog Computing vs. Edge Computing: Their Roles in Modern Technology
10 months ago
Fog computing vs. edge computing: Understand how they compare, their unique benefits, and which is best for your data processing needs in IoT and beyond.
Mike Elissen
Navigating the Future of Scope 2: Balancing Impact and Practicality
10 months ago
The Greenhouse Gas Protocol’s Scope 2 revisions demand thoughtful action. Read how we’re prioritizing meaningful, measurable impact over rapid progress.
Mike Mattera
Fog Computing vs. Edge Computing: Their Roles in Modern Technology
10 months ago
Fog computing vs. edge computing: Understand how they compare, their unique benefits, and which is best for your data processing needs in IoT and beyond.
Mike Elissen
Why It’s Time to Retire Traditional VPNs, Part 1
10 months ago
Elad Lev & Jim Black
Honoring Innovation, Growth, and Collaboration: The Akamai Partner Awards
10 months ago
Introducing the Akamai Partner Awards, which recognize excellence — both organizational and individual — in sales, services, marketing, and technical impact.
Prince Jason Albert
Introducing Akamai DNS Posture Management
10 months ago
Sandra Murphy
The Akamai Innovation Tour: A Journey in Perspective and Partnership
10 months 1 week ago
“What does innovation mean to you?” Read how one marketer answered that question after attending the 2025 Akamai Innovation Tour.
Nick Watkins
Damage Control: Why Building Cyber Resilience Is Non-Negotiable
10 months 1 week ago
It’s only a matter of time before attackers find a crack in your security armour. Learn how to combine resilience with compliance and protect what matters most.
Richard Meeus
App Platform Updates: Customizable Catalog, Git-Based Secrets Management, and Automated Management of K8s Projects
10 months 1 week ago
In this blog, we’ll shortly touch on App Platform’s new features and improvements, plus we’ll look ahead at some major changes that are in our pipeline.
Sander Rodenhuis (Sander Rodenhuis)
AI in Cybersecurity: How AI Is Impacting the Fight Against Cybercrime
10 months 2 weeks ago
AI is transforming cybersecurity. Explore how hackers use AI for cybercrimes and how cybersecurity experts use AI to prevent, detect, and respond to attacks.
Christine Ferrusi Ross
Checked
4 hours 36 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed