The Akamai Blog
Critical Linux RCE Vulnerability in CUPS ? What We Know and How to Prepare
1 day 15 hours ago
Akamai Security Intelligence Group
DDoS Attack Trends in 2024 Signify That Sophistication Overshadows Size
2 days 15 hours ago
Sven Dummer, Dennis Birchard, Sandeep Rath & Bruce Van Nice
Speed with Precision: Early and Accurate Response to Apache Camel CVEs
2 days 18 hours ago
Danielle Walter & Tim Cote
Unlocking the Next Wave of Edge Computing with Serverless WebAssembly
1 week 1 day ago
Brent Eiler & Matt Butcher
Anatomy of a SYN-ACK Attack
1 week 1 day ago
Chad Seaman
Enhancing Public Sector Cybersecurity with Akamai API Security
1 week 6 days ago
Learn how Akamai's API security solution helps federal agencies identify, protect, and monitor API traffic in real time.
Stephen Ringo
To Meet Compliance Challenges, Focus on Building Great Security
1 week 6 days ago
Tony Lauro
Emissions Transparency: Moving Toward a More Rigorous Verification
2 weeks ago
Katie Robinson
Akamai Wins Best Sales Leadership Development Program from Brandon Hall
2 weeks 1 day ago
Learn how Akamai's award-winning sales leadership development program transforms sales managers into impactful coaches, driving growth and performance.
Chelsey Pine
Akamai?s Channel-First Strategy: Driving Partner Success in 2025
2 weeks 2 days ago
Customer success is Akamai?s priority ? and our many industry awards highlight how we've empowered our partners to thrive. See what we have planned for 2025.
Janki Kaura
Detecting and Mitigating an Authorization Bypass Vulnerability in Next.js
2 weeks 2 days ago
Akamai Security Intelligence Group
Why AI Demands a New Security Playbook
2 weeks 5 days ago
Understand the new AI security threats and how Akamai can help you develop a risk mitigation strategy.
Rupesh Chokshi
Akamai Named a Leader in the Latest Forrester Report for WAF Solutions
2 weeks 6 days ago
Danielle Walter
Detecting and Mitigating Apache Tomcat CVE-2025-24813
2 weeks 6 days ago
Akamai Security Intelligence Group
The Hidden Costs and Ethical Pitfalls of Content Scraping
3 weeks ago
Read about the significant hidden costs and ethical pitfalls of content scraping ? and learn how to protect your website.
Jagdish Mohite
Cryptominers? Anatomy: Analyzing Cryptominers
3 weeks ago
Maor Dahan
Negative Exposure: Edimax Network Cameras Used to Spread Mirai
3 weeks 6 days ago
Mirai continues to plague organizations. Read how the Akamai SIRT identified a new command injection vulnerability that?s targeting Edimax devices.
Kyle Lefton & Larry Cashdollar
Detecting and Mitigating the Apache Camel Vulnerabilities
4 weeks 1 day ago
Akamai researchers have created detection scripts and additional details for the Apache Camel vulnerabilities CVE-2025-27636 and CVE-2025-29891.
Akamai Security Intelligence Group
From Good to Great: Mastering Day-2 Network Security Policy
4 weeks 1 day ago
Zohar Furman
Checked
5 hours 31 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed