The Akamai Blog
Akamai’s Perspective on November’s Patch Tuesday 2024
1 year 2 months ago
Akamai Security Intelligence Group
Akamai Managed Database Services: Powered by Aiven
1 year 2 months ago
Akamai has partnered with Aiven, a leading global managed database provider, to offer customers a streamlined way to offload the complexities of database setup, configuration, patching, backups, and scaling.
Peter Sari (Peter Sari)
The Definitive Guide to Linux Process Injection
1 year 2 months ago
Ori David
Study Reveals Security Teams Feel the Impact of Rising API Threats
1 year 2 months ago
API abuse is increasing at an alarming rate. Read this post to learn the four areas of focus for organizations that are seeking to protect their APIs.
Rupesh Chokshi
Getting Started with Akamai App Platform
1 year 2 months ago
Step-by-step instructions to provision a Kubernetes cluster with Akamai App Platform enabled and then build, deploy and publicly expose an application.
Sander Rodenhuis (Sander Rodenhuis)
Introducing the Akamai App Platform
1 year 2 months ago
Over the past decade, developers have been forced to choose between two evils: either accept Big Cloud’s complexity, costs, and lock-in, or struggle and lose precious time building everything from scratch. Like code itself, it was a binary decision.
Ari Weil
Finding Solutions to Meet PCI DSS v4.0 Requirements 6.4.3 and 11.6.1
1 year 2 months ago
Boris Kirzner
Akamai's Behavioral DDoS Engine: A Breakthrough in Modern DDoS Mitigation
1 year 2 months ago
As digital infrastructure grows, so do the threats posed by DDoS attacks. See how the Akamai Behavioral DDoS Engine can keep your business online.
Aseem Ahmed & Abdeslam Bella
Rails Without Derails: Thwarting Code Injection Attacks
1 year 2 months ago
Sam Tinklenberg, Maxim Zavodchik & Aparna Mandal
Rails Without Derails: Thwarting Code Injection Attacks
1 year 2 months ago
Sam Tinklenberg, Maxim Zavodchik & Aparna Mandal
Exploring Artificial Intelligence: Is AI Overhyped?
1 year 2 months ago
Dive into AI technologies like inference, deep learning, and generative models to learn how LLMs and AI are transforming cybersecurity and tech industries.
Berk Veral
How Ransomware Is Delivered and How to Prevent Attacks
1 year 2 months ago
Jacob Abrams
In the Dark about Shadow APIs?
1 year 2 months ago
I’m often asked about shadow APIs and shadow API parameters—even by people with a lot of experience in the API development space.
Alex Leung
6 Steps for Cyber Resilience During the 2024 U.S. Presidential Election
1 year 2 months ago
Learn about the risks to service availability during the 2024 U.S. presidential election — and the six steps you can take now to ensure your cyber resilience.
Ryan Gao
Beyond the Login — Keeping Accounts Secure with Lifecycle Protection
1 year 2 months ago
Emily Lyons
Bad Bots: 6 Common Bot Attacks and Why They Happen
1 year 2 months ago
Learn about the different types of bot attacks, why they happen, and how to protect your website from these threats with effective bot mitigation strategies.
Christine Ferrusi Ross
Scrub EXIF Image Data in Your DevOps Pipeline
1 year 3 months ago
In this post, we’ll go over why you need to scrub EXIF image data and how to integrate this process into your DevOps pipeline.
Alex Leung
Improve SEO with Prerender.io
1 year 3 months ago
In this post, we’ll look at how prerendering services from Prerender.io can help you overcome SEO obstacles when using these frameworks.
Tim Vereecke
Loose Lips Can Sink Websites Too
1 year 3 months ago
When we think about keeping websites safe, we often imagine complex firewalls, multi-layered defenses, and robust encryption.
Alex Leung
Checked
9 hours 20 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed