The Akamai Blog
Akamai’s Tailored Approach to Net Zero
1 year ago
Mike Mattera
Live Streaming with Akamai’s Distributed Compute Regions
1 year ago
Nazir Kabani
Object Storage Use Cases in Focus: New Endpoints for Higher Capacity and Speed
1 year ago
Peter Sari (Peter Sari)
Data Security: Challenges, Solutions, and the Path Forward
1 year ago
Learn why a more proactive, integrated, and dynamic approach to data security is crucial to effectively safeguard your business in today’s digital landscape.
Jagdish Mohite
How Your Business Can Benefit From Combining a DAM and CDN
1 year ago
Jean-François Lecas
Making an Impact: Beach Cleanup and Reforestation Event
1 year ago
Akamai volunteers in Costa Rica came together to remove trash from the beach and plant trees — and they learned how their everyday choices affect the planet.
Braulio Rojas
Major Enhancements to Akamai API Security, Q4 2024
1 year 1 month ago
The Akamai API Security updates 3.38, 3.39, and 3.40 include configurable blocking, the automatic creation of posture findings from runtime incidents, and more.
Stas Neyman
Protecting Unmanaged Devices with Armis and Akamai
1 year 1 month ago
Jacob Abrams
DigiEver Fix That IoT Thing!
1 year 1 month ago
Kyle Lefton, Daniel Messing & Larry Cashdollar
AVANT and Akamai: Solving Security Challenges for Financial Services
1 year 1 month ago
Read why AVANT’s Trusted Advisors recommend to their clients Akamai’s award-winning solutions in cloud computing, cybersecurity, and application protection.
Kathleen Moore
The Benefits of Serverless Computing Architecture
1 year 1 month ago
Mike Elissen
Empowering Women in Cybersecurity: Lessons from the FS-ISAC Women’s Networking Event
1 year 1 month ago
Discover strategies for empowering women in cybersecurity, gleaned from lessons learned at the 2024 FS-ISAC women’s networking event.
Lisa Beegle
Akamai’s Perspective on December’s Patch Tuesday 2024
1 year 1 month ago
Akamai Security Intelligence Group
Akamai Technical Academy and Coursera: A Year of STEM Education Success
1 year 1 month ago
Carrie Bergman, Jamie Ng & Shirley Jiang
What To Do When You’re Under a DDoS Attack: A Guide to Action
1 year 1 month ago
Sven Dummer & Sandeep Rath
Teaching an Old Framework New Tricks: The Dangers of Windows UI Automation
1 year 1 month ago
Tomer Peled
Teaching an Old Framework New Tricks: The Dangers of Windows UI Automation
1 year 1 month ago
Tomer Peled
Bot Reporting: 4 Key Differences to Consider
1 year 1 month ago
Get a detailed look at Akamai’s bot reporting and the important advantages it offers to organizations that are looking to improve their bot defenses.
Christine Ferrusi Ross
What You Should Know About BreakingWAF
1 year 1 month ago
BreakingWAF is not a vulnerability stemming from WAF solutions — it is a misconfiguration vulnerability that can be addressed during customer onboarding.
Akamai Security Research
Checked
6 hours 4 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed