The Akamai Blog
The Reality of Modern Cyberattacks: Lessons from Recent Retail Breaches
3 months 3 weeks ago
Jim Black
Generative Personalization at the Edge: The Future of E‑Commerce Isn’t (Just) in the Cloud
3 months 3 weeks ago
Pedro Salvado
Akamai and Bitmovin: Revolutionizing Live and On-Demand Video Streaming
3 months 3 weeks ago
Discover how Akamai and Bitmovin’s partnership reduces costs, enhances performance, and delivers personalized video experiences to content providers.
Adam Massaro
Agentic AI: How Autonomous Agents are Changing the Game
3 months 3 weeks ago
Vineeth Varughese
A Coordinated Response to MadeYouReset HTTP/2 Protocol Attacks
3 months 3 weeks ago
Mike Bishop
From Discovery to Testing: Akamai and Snyk Deliver Seamless API Security
3 months 3 weeks ago
Stas Neyman
Visualize Security Success with the Security Summary Dashboard
3 months 3 weeks ago
Jim Black
CVE-2025-32094: HTTP Request Smuggling Via OPTIONS + Obsolete Line Folding
4 months ago
In March 2025, Akamai received a bug bounty report identifying an HTTP Request Smuggling vulnerability that was quickly resolved for all customers.
Akamai InfoSec
Post-Quantum Cryptography Implementation Considerations in TLS
4 months ago
Jan Schaumann
AI in Cloud Computing: How AI Is Revolutionizing the Landscape
4 months ago
Discover how AI in cloud computing is transforming industries. Learn about the differences between cloud AI and edge AI — their benefits, use cases, and solutions.
Pavel Despot
Open Source & Fully Managed: Aiven-Powered Databases on Akamai
4 months ago
Peter Sari (Peter Sari)
Why the Right Tool — and the Right Team — Are Essential for DNS Security
4 months ago
Derek Hammack
Why AI Systems Use Vector Databases to Improve Performance and Reduce Costs
4 months ago
Amit Mohanty
Gartner Market Guide: Microsegmentation for Zero Trust and Resilience
4 months ago
Shivangi Sahu
3 Key Areas to Focus on When You're Evaluating AI Security
4 months ago
Berk Veral
Publishers: How to Block AI Bots and Reclaim Control of Your Content
4 months 1 week ago
Mani Sundaram
The Price of Poor Cybersecurity in 2024: US$3.1 Billion
4 months 1 week ago
Jim Black
Surviving the Ransomware Gauntlet: A Test of Resilience
4 months 1 week ago
Tricia Howard & Maria Vlasak
Beyond Perimeter Defense: Implementing Zero Trust in Federal Agencies
4 months 1 week ago
Learn how to address cybersecurity in this new perimeter-less world and get six steps to achieving Least Permissive Trust for federal agencies.
Micah Maryn
Checked
10 hours 50 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed