The Akamai Blog
The Secret to Reducing Compliance Risk in Financial Services: Visibility
1 year 3 months ago
Enhanced visibility is key to managing compliance risk in financial services. Discover how a unified view can improve resilience, protect data, and build trust.
Steve Winterfeld
Managing AI Bots as Part of Your Overall Bot Management Strategy
1 year 4 months ago
Learn about the potential impacts of AI bots and the importance of having a holistic bot management strategy.
Ilia Bromberg & Christine Ferrusi Ross
Segmenting Hybrid Clouds: What to Look for in a Solution
1 year 4 months ago
Learn how to select a microsegmentation solution to fortify your organization’s cloud security strategies and protect your assets across multiple public clouds.
Jacob Abrams
Everything You Need to Know About Edge Networks
1 year 4 months ago
Mike Elissen
More Power at the Edge: Introducing Distributed Compute Regions
1 year 4 months ago
For edge-native applications, performance is closely tied to the location of cloud services.
Maddie Presland
Five Ways to Prevent and Protect Against Ransomware Attacks
1 year 4 months ago
Jacob Abrams
Akamai’s Perspective on November’s Patch Tuesday 2024
1 year 4 months ago
Akamai Security Intelligence Group
Akamai Managed Database Services: Powered by Aiven
1 year 4 months ago
Akamai has partnered with Aiven, a leading global managed database provider, to offer customers a streamlined way to offload the complexities of database setup, configuration, patching, backups, and scaling.
Peter Sari (Peter Sari)
The Definitive Guide to Linux Process Injection
1 year 4 months ago
Ori David
Study Reveals Security Teams Feel the Impact of Rising API Threats
1 year 4 months ago
API abuse is increasing at an alarming rate. Read this post to learn the four areas of focus for organizations that are seeking to protect their APIs.
Rupesh Chokshi
Getting Started with Akamai App Platform
1 year 4 months ago
Step-by-step instructions to provision a Kubernetes cluster with Akamai App Platform enabled and then build, deploy and publicly expose an application.
Sander Rodenhuis (Sander Rodenhuis)
Introducing the Akamai App Platform
1 year 4 months ago
Over the past decade, developers have been forced to choose between two evils: either accept Big Cloud’s complexity, costs, and lock-in, or struggle and lose precious time building everything from scratch. Like code itself, it was a binary decision.
Ari Weil
Finding Solutions to Meet PCI DSS v4.0 Requirements 6.4.3 and 11.6.1
1 year 4 months ago
Boris Kirzner
Akamai's Behavioral DDoS Engine: A Breakthrough in Modern DDoS Mitigation
1 year 4 months ago
As digital infrastructure grows, so do the threats posed by DDoS attacks. See how the Akamai Behavioral DDoS Engine can keep your business online.
Aseem Ahmed & Abdeslam Bella
Rails Without Derails: Thwarting Code Injection Attacks
1 year 4 months ago
Sam Tinklenberg, Maxim Zavodchik & Aparna Mandal
Rails Without Derails: Thwarting Code Injection Attacks
1 year 4 months ago
Sam Tinklenberg, Maxim Zavodchik & Aparna Mandal
Exploring Artificial Intelligence: Is AI Overhyped?
1 year 4 months ago
Dive into AI technologies like inference, deep learning, and generative models to learn how LLMs and AI are transforming cybersecurity and tech industries.
Berk Veral
How Ransomware Is Delivered and How to Prevent Attacks
1 year 4 months ago
Jacob Abrams
In the Dark about Shadow APIs?
1 year 4 months ago
I’m often asked about shadow APIs and shadow API parameters—even by people with a lot of experience in the API development space.
Alex Leung
Checked
16 minutes 40 seconds ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed