The Akamai Blog
Rails Without Derails: Thwarting Code Injection Attacks
1 year ago
Sam Tinklenberg, Maxim Zavodchik & Aparna Mandal
Exploring Artificial Intelligence: Is AI Overhyped?
1 year 1 month ago
Dive into AI technologies like inference, deep learning, and generative models to learn how LLMs and AI are transforming cybersecurity and tech industries.
Berk Veral
How Ransomware Is Delivered and How to Prevent Attacks
1 year 1 month ago
Jacob Abrams
In the Dark about Shadow APIs?
1 year 1 month ago
I’m often asked about shadow APIs and shadow API parameters—even by people with a lot of experience in the API development space.
Alex Leung
6 Steps for Cyber Resilience During the 2024 U.S. Presidential Election
1 year 1 month ago
Learn about the risks to service availability during the 2024 U.S. presidential election — and the six steps you can take now to ensure your cyber resilience.
Ryan Gao
Beyond the Login — Keeping Accounts Secure with Lifecycle Protection
1 year 1 month ago
Emily Lyons
Bad Bots: 6 Common Bot Attacks and Why They Happen
1 year 1 month ago
Learn about the different types of bot attacks, why they happen, and how to protect your website from these threats with effective bot mitigation strategies.
Christine Ferrusi Ross
Scrub EXIF Image Data in Your DevOps Pipeline
1 year 1 month ago
In this post, we’ll go over why you need to scrub EXIF image data and how to integrate this process into your DevOps pipeline.
Alex Leung
Improve SEO with Prerender.io
1 year 1 month ago
In this post, we’ll look at how prerendering services from Prerender.io can help you overcome SEO obstacles when using these frameworks.
Tim Vereecke
Loose Lips Can Sink Websites Too
1 year 1 month ago
When we think about keeping websites safe, we often imagine complex firewalls, multi-layered defenses, and robust encryption.
Alex Leung
How In-Person Meetings Fast-Tracked Our vPPA Negotiations in Europe
1 year 1 month ago
In-person interactions can build trust, foster collaboration, and achieve efficiency — especially for complex negotiations — even in the post-pandemic world.
Mike Mattera
Call and Register — Relay Attack on WinReg RPC Client
1 year 1 month ago
Stiv Kupchik
Pay Attention to Your Non-Production Subdomains
1 year 1 month ago
It’s common for security teams to focus their best efforts on an organization’s primary production domain.
Alex Leung
Why Modern Layer 7 DDoS Protections Are Crucial for Web Security in 2024
1 year 1 month ago
A new Akamai white paper explains why you need to prioritize modern Layer 7 DDoS protection — and details how you can guide your security efforts.
Danielle Walter
Simplify Security and Enhance WAAP with Detection and Control in the AI Era
1 year 1 month ago
Simplify operations without sacrificing control. Read how Akamai delivers a robust defense with innovations like Behavioral DDoS Engine and AI Assistant.
Danielle Walter
What’s New for Developers: October 2024
1 year 1 month ago
In addition to several articles that help you keep your applications and websites safe, we’re sharing news on the latest Akamai PowerShell release, instructions for building a NAT Gateway in a VPC, new docs for migrating to Linode Object Storage, and more.
Jessica Capuano Mora
Anonymous Sudan Takedown: Akamai's Role
1 year 1 month ago
Akamai SIRT
Akamai’s Perspective on October’s Patch Tuesday 2024
1 year 1 month ago
Akamai Security Intelligence Group
In-memory Data Management Caching Tools: A Guide to the Best Options
1 year 1 month ago
In-memory data management caching tools store frequently accessed data in memory, which significantly improves performance by reducing how often the database needs to be accessed.
Akamai
Checked
8 hours 16 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed