The Akamai Blog
How Companies Are Balancing AI Innovation with Risk
6 months ago
A new Forrester report, commissioned by Akamai, reveals how companies are pursuing AI innovation at scale without exposure to unacceptable levels of risk.
Ari Weil
AI Training Data: Winning in the AI Boom
6 months 1 week ago
Jagdish Mohite
Boost the Performance and Security — and Lower the Costs — of AI Apps
6 months 1 week ago
Elan Shanker & Christine Ferrusi Ross
Understand the Attack Surface: Retail Supply Chain Cybersecurity Risks
6 months 1 week ago
Jim Black
Off Your Docker: Exposed APIs Are Targeted in New Malware Strain
6 months 2 weeks ago
Yonatan Gilvarg
Your AI Strategy Is Only as Strong as Your DNS
6 months 2 weeks ago
Sandra Murphy
Your AI Strategy Is Only as Strong as Your DNS
6 months 2 weeks ago
Sandra Murphy
Certificate Chaos and the Case for Automated Posture Management
6 months 2 weeks ago
Sandra Murphy & Sven Dummer
Breach Highlights AI and API Vulnerabilities in Software Supply Chains
6 months 2 weeks ago
Christine Ferrusi Ross
Virtualized (In)Security: How Attackers Can Weaponize VBS Enclaves
6 months 2 weeks ago
Read about Ori David’s presentation at DEF CON 33 and learn how attackers can abuse VBS enclaves, a Windows security feature, for malicious purposes.
Ori David
Akamai Enables Post-Quantum Cryptography on the Edge
6 months 2 weeks ago
Learn about the latest development in our post-quantum journey: Support for post-quantum cryptography on the Akamai edge.
Jan Schaumann
These 4 Threats to AI Applications Require New Cybersecurity Strategies
6 months 3 weeks ago
Learn about the four threat categories that today’s cybersecurity teams must address to protect their companies’ AI investments.
Swati Kumar
An Inside Look at our Next Gen Object Storage Launch
6 months 3 weeks ago
Jason Tanabe
CVE-2025-54142: HTTP Request Smuggling via OPTIONS + Body
6 months 3 weeks ago
Learn how Akamai InfoSec mitigated CVE-2025-54142 — an HTTP request smuggling vulnerability arising from OPTIONS requests with a body.
Akamai InfoSec
BadSuccessor Is Dead, Long Live BadSuccessor(?)
6 months 3 weeks ago
Read about Microsoft’s patch for BadSuccessor — a vulnerability in Windows Server Active Directory — and learn why its underlying mechanics still matter.
Yuval Gordon
Protect Critical Infrastructure: Cybersecurity Strategies for Governments
6 months 3 weeks ago
Learn actionable strategies that can help state and local governments protect critical infrastructure and dramatically reduce risk exposure.
Douglas Holland
Our New Premium Managed Databases Plan for Resource-Intensive Workloads
6 months 3 weeks ago
Peter Sari (Peter Sari)
Boost EdgeWorker Observability: Set Up Logging With DataStream
6 months 3 weeks ago
AJ Johnson
Marginal Emissions Rates: See Carbon Emissions with Clarity in Real Time
6 months 3 weeks ago
Learn how Akamai is using marginal emissions rates to improve the transparency and accuracy of our emissions accounting.
Katie Robinson
Checked
5 hours 35 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed