The Akamai Blog
Is Network Security Still a Thing in the Age of Public Cloud?
1 year 11 months ago
Akamai Guardicore Segmentation is extending its segmentation capabilities to hybrid cloud environments.
Ravit Greitser
Keep Your Tech Flame Alive: Akamai Trailblazer — Richa Dayal
1 year 11 months ago
Akamai FLAME Team
Advocating for Inclusion in Tech
1 year 11 months ago
Tashema Nichols-Jones
Workloads on Any Cloud: Designing a Cloud Portability Strategy
1 year 11 months ago
Billy Thompson
Exploitation Observed: Ivanti Connect Secure — CVE-2023-46805 and CVE-2024-21887
1 year 11 months ago
Noam Atias & Sam Tinklenberg
Data Matters — Empowering Threat Hunters to Reduce API Risk
1 year 11 months ago
Abigail Ojeda
Akamai’s Perspective on February’s Patch Tuesday 2024
1 year 11 months ago
Akamai Security Intelligence Group
Will VPN Security Vulnerabilities Accelerate ZTNA Adoption?
1 year 11 months ago
Andrew Terranova & Tommy Cormier
CVE-2023-50387 and CVE-2023-50868 — DNS Exploit KeyTrap Posed Major Internet Threat
1 year 11 months ago
Ralf Weber, Jan Schaumann & Bruce Van Nice
What’s Next for Akamai’s Cloud Computing Strategy
1 year 11 months ago
Tom Leighton
Scanning Activity for CVE-2024-22024 (XXE) Vulnerability in Ivanti
1 year 11 months ago
Sam Tinklenberg & Noam Atias
Say Goodbye to Monolithic EdgeWorkers: Introducing Flexible Composition (Part 2)
1 year 11 months ago
Evan Hughes & AJ Johnson
Data Matters — Is Your API Security Data Rich or Data Poor?
1 year 11 months ago
Taking a data-rich approach to security is the most effective way to stay a step ahead of today’s quickly evolving API threats.
Abigail Ojeda
The AnyDesk Breach: Overview and Recommendations
1 year 11 months ago
Akamai Security Intelligence Group
Akamai Named an Overall Leader for Zero Trust Network Access
1 year 11 months ago
Jim Black
The Web Scraping Problem, Part 3: Protecting Against Botnets
1 year 11 months ago
David Sénécal
Stop Scrapers and Scalpers with Akamai Content Protector
1 year 11 months ago
Christine Ferrusi Ross
What to Do When Your VPN Provider Suffers from Zero-Day Vulnerabilities
2 years ago
Jim Black
The Web Scraping Problem, Part 2: Use Cases that Require Scraping
2 years ago
David Sénécal
Checked
33 minutes 34 seconds ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed