The Akamai Blog
Defend Post-Quantum Cryptography's “Harvest Now, Decrypt Later” with WAAP
2 months ago
Prepare for a quantum-safe future. Learn how Akamai App & API Protector helps stop the data leaks that fuel “harvest now, decrypt later” attacks.
Danielle Walter
Full Circle: How Akamai’s Evolution Set the Stage for the AI Inference Era
2 months 1 week ago
Read how Akamai, a pioneer in CDNs, is undergoing a profound strategic transformation into a diversified cloud and cybersecurity provider in the AI era.
Mike Maney
Belonging at Akamai: My Journey of Inclusion, Growth, and Connection
2 months 1 week ago
Discover how Akamai’s culture of belonging and inclusion empowers employees and drives innovation in tech.
Ramita Singh
Beyond NSX: A Strategic Alternative for VMware Customers
2 months 1 week ago
Broadcom’s VMware acquisition has driven up costs and complexity. Akamai Guardicore Segmentation offers a modern, secure, and cost-efficient path beyond NSX.
Jacob Abrams
Scam Alert: Impersonation of Akamai on Telegram
2 months 1 week ago
Learn about a persisting scam on Telegram that involves scammers who are pretending to be from Akamai and requesting money.
Akamai InfoSec
Aggregated Rate Limiting Defends Against Large-Scale and DDoS Attacks
2 months 1 week ago
Discover how Akamai’s new aggregated rate limiting strengthens defenses against large-scale, distributed DDoS attacks, and API abuse with smarter detection.
Irina McDougall
AI Pulse: How OpenAI Became the Majority Player
2 months 1 week ago
Tom Emmons
Distributed Edge Inference Changes Everything
2 months 1 week ago
Ari Weil
A Pre-Built CNCF Pipeline: From Git to Running on Kubernetes
2 months 1 week ago
Prasoon Pushkar
Bot Management for the Agentic Era
2 months 2 weeks ago
David Sénécal
Firmwhere? Rediscovering a Vulnerability in Vivotek Legacy Firmware
2 months 2 weeks ago
Larry Cashdollar
A CMO’s Perspective: Why This Moment Matters in the AI Era
2 months 2 weeks ago
Akamai’s CMO describes how the company is radically rethinking and extending the systems needed to unlock AI's true potential.
Kim Salem-Jackson
When the Internet Fails Again, Will You Survive a DDoS Attack?
2 months 2 weeks ago
Sven Dummer, Sandeep Rath & Ankita Kharya
What We Do In The Shadow (AI): New Malware Strain Vamps Up
2 months 2 weeks ago
Yonatan Gilvarg
AI Pulse: The Rise of AI Search Crawlers
2 months 2 weeks ago
Tom Emmons
Zero Trust Security for Mission Partner Environments in Coalition Operations
2 months 2 weeks ago
Mike Colson & Jason Turse
Future-Proofing Retail Security: Preparing for Tomorrow's Cyberthreats
2 months 3 weeks ago
Learn about the emerging cybersecurity threats facing retailers and the advanced technologies needed to build adaptive, future-ready security defenses.
Jim Black
AI Pulse: AI Bots Are Targeting Commerce, Publishers, and High Tech
2 months 3 weeks ago
Tom Emmons
Redefine Trust with Web Bot Authentication
2 months 3 weeks ago
Rupesh Chokshi
Checked
4 hours 59 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed