The Akamai Blog
Why AI Inference is Driving the Shift from Centralized to Distributed Cloud Computing
8 months 1 week ago
Vineeth Varughese
Distributed Cloud Solutions and AI: Key Findings from Forrester's 2024 Study
8 months 1 week ago
Santiago Giraldo
Akamai Wins Best Sales Leadership Development Program from Brandon Hall
8 months 1 week ago
Learn how Akamai's award-winning sales leadership development program transforms sales managers into impactful coaches, driving growth and performance.
Chelsey Pine
Akamai’s Channel-First Strategy: Driving Partner Success in 2025
8 months 1 week ago
Customer success is Akamai’s priority — and our many industry awards highlight how we've empowered our partners to thrive. See what we have planned for 2025.
Janki Kaura
Detecting and Mitigating an Authorization Bypass Vulnerability in Next.js
8 months 1 week ago
Akamai Security Intelligence Group
Why AI Demands a New Security Playbook
8 months 2 weeks ago
Understand the new AI security threats and how Akamai can help you develop a risk mitigation strategy.
Rupesh Chokshi
Akamai Named a Leader in the Latest Forrester Report for WAF Solutions
8 months 2 weeks ago
Danielle Walter
No Lag, All Frag: Level Up Your Gaming with Xonotic, K3s, and Edge Computing
8 months 2 weeks ago
Michael Archer
Detecting and Mitigating Apache Tomcat CVE-2025-24813
8 months 2 weeks ago
Akamai Security Intelligence Group
The Hidden Costs and Ethical Pitfalls of Content Scraping
8 months 2 weeks ago
Read about the significant hidden costs and ethical pitfalls of content scraping — and learn how to protect your website.
Jagdish Mohite
Cryptominers’ Anatomy: Analyzing Cryptominers
8 months 2 weeks ago
Maor Dahan
Negative Exposure: Edimax Network Cameras Used to Spread Mirai
8 months 3 weeks ago
Mirai continues to plague organizations. Read how the Akamai SIRT identified a new command injection vulnerability that’s targeting Edimax devices.
Kyle Lefton & Larry Cashdollar
Detecting and Mitigating the Apache Camel Vulnerabilities
8 months 3 weeks ago
Akamai researchers have created detection scripts and additional details for the Apache Camel vulnerabilities CVE-2025-27636 and CVE-2025-29891.
Akamai Security Intelligence Group
From Good to Great: Mastering Day-2 Network Security Policy
8 months 3 weeks ago
Zohar Furman
Behind the Scenes: Introducing the Akamai Design System
8 months 3 weeks ago
We recently made some design changes to our UI to improve the user experience. Lead Senior Software Engineer Jaalah Ramos expands on the “why” in this Q&A.
Maddie Presland
Magecart: How Akamai Protected a Global Retailer Against a Live Attack
8 months 4 weeks ago
Gal Meiri
Scale Transcoding and AI Workloads with GPU Kubernetes Clusters
8 months 4 weeks ago
Hana Jeddy
Mastering Kubernetes: From Troubleshooting to Simplicity
9 months ago
Billy Thompson
Why Are Airlines a Prime Target for Cyberattacks?
9 months ago
Jim Black & Eric Rubenov
Checked
4 hours 33 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed