The Akamai Blog
NetKiller.Condi Botnet Exploits CVE-2024-0778 One Week After Disclosure
1 year 1 month ago
Kyle Lefton & Larry Cashdollar
6 Ways Akamai Innovates to Strengthen Their Leadership in Application Security
1 year 1 month ago
Danielle Walter
The Benefits of Microsegmentation for Compliance
1 year 1 month ago
Ravit Greitser
Address the Challenges of Compliance and Cybersecurity with Zero Trust
1 year 1 month ago
The intersection of compliance and cybersecurity is an opportunity for your organization to adopt solutions that simultaneously solve challenges in both areas.
Ravit Greitser
Noname Security Platform Updates: 3.27 Release
1 year 1 month ago
Stas Neyman
Is Network Security Still a Thing in the Age of Public Cloud?
1 year 1 month ago
Akamai Guardicore Segmentation is extending its segmentation capabilities to hybrid cloud environments.
Ravit Greitser
Keep Your Tech Flame Alive: Akamai Trailblazer ? Richa Dayal
1 year 1 month ago
Akamai FLAME Team
Learning from the LockBit Takedown
1 year 1 month ago
Dean Houari
Advocating for Inclusion in Tech
1 year 1 month ago
Tashema Nichols-Jones
Exploitation Observed: Ivanti Connect Secure ? CVE-2023-46805 and CVE-2024-21887
1 year 1 month ago
Noam Atias & Sam Tinklenberg
Data Matters ? Empowering Threat Hunters to Reduce API Risk
1 year 1 month ago
Abigail Ojeda
Akamai?s Perspective on February?s Patch Tuesday 2024
1 year 1 month ago
Akamai Security Intelligence Group
Will VPN Security Vulnerabilities Accelerate ZTNA Adoption?
1 year 1 month ago
Andrew Terranova & Tommy Cormier
CVE-2023-50387 and CVE-2023-50868 ? DNS Exploit KeyTrap Posed Major Internet Threat
1 year 1 month ago
Ralf Weber, Jan Schaumann & Bruce Van Nice
What?s Next for Akamai?s Cloud Computing Strategy
1 year 1 month ago
Tom Leighton
Scanning Activity for CVE-2024-22024 (XXE) Vulnerability in Ivanti
1 year 1 month ago
Sam Tinklenberg & Noam Atias
Say Goodbye to Monolithic EdgeWorkers: Introducing Flexible Composition (Part 2)
1 year 2 months ago
Evan Hughes & AJ Johnson
Data Matters ? Is Your API Security Data Rich or Data Poor?
1 year 2 months ago
Taking a data-rich approach to security is the most effective way to stay a step ahead of today?s quickly evolving API threats.
Abigail Ojeda
The AnyDesk Breach: Overview and Recommendations
1 year 2 months ago
Akamai Security Intelligence Group
Checked
5 hours 43 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed