The Akamai Blog
When the Cloud Breaks: Lessons from the AWS Outage
3 months 4 weeks ago
Sandra Murphy
The Grim SessionReaper (CVE-2025-54236) Comes to Collect for Halloween
3 months 4 weeks ago
Akamai Security Intelligence Group
Unlocking Hidden Value: How AI Transforms Media Archives into Revenue Engines
4 months ago
Ira Dworkin & Joseph Glover
Enhancements to Akamai API Security, Q3 2025
4 months ago
The recent Akamai API Security updates improve visibility, automation, coverage, and compliance across the API lifecycle.
Stas Neyman
Navigating the Next Chapter in Corporate Renewable Energy
4 months ago
Margot Hines
Why AI-Powered Firewall Defense Is the Boldest Cybersecurity Shift of 2025
4 months ago
Static firewalls are failing. Discover how AI-powered firewalls predict, adapt, and defend at machine speed — reshaping cybersecurity in 2025 and beyond.
Ramita Singh
AI Pulse: AI Bot Mitigation Is Increasing Everywhere
4 months ago
Tom Emmons
Learning from the LockBit Takedown
4 months 1 week ago
Dean Houari
The Differences Between API Gateway and WAAP — and Why You Need Both
4 months 1 week ago
Danielle Walter
How to Get Started with NVIDIA cuOpt
4 months 1 week ago
A simple guide to get started with cuOpt, an open source, GPU-accelerated solver for decision optimization.
Atalay Kutlay
Protect Hype Events: Bot-Proof Launches with Akamai and Queue-it
4 months 1 week ago
Emily Lyons
How to Automate Your Security Posture for the 47-Day Certificate Era
4 months 1 week ago
Brian Fahey
How to Prevent Command Injection and SQL Injection Attacks over MCP
4 months 1 week ago
Noam Atias & Maxim Zavodchik
AI Pulse: OpenAI’s Wild Bot Behavior After GPT-5
4 months 2 weeks ago
The AI Pulse series breaks down traffic trends and what they mean for apps, APIs, and businesses. In this post, read how OpenAI’s bots are changing after GPT-5.
Rob Lester
Linode Kubernetes Engine Optimization: Save on Compute, Storage, and Networking
4 months 2 weeks ago
Prasoon Pushkar
Akamai Named a Gartner Peer Insights Customers’ Choice for WAAP Six Years in a Row
4 months 2 weeks ago
Danielle Walter
A Guide to International Post-Quantum Cryptography Standards
4 months 2 weeks ago
Jan Schaumann
AI Inference Hardware Decisions: When to Choose CPUs vs. GPUs
4 months 2 weeks ago
Joseph Glover
Identity-Centric Security: ICAM as a Mission Advantage
4 months 3 weeks ago
Jacob Abrams & Jim Black
Checked
9 hours 56 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed