The Akamai Blog
Enhancements to Akamai API Security, Q3 2025
1 month 1 week ago
The recent Akamai API Security updates improve visibility, automation, coverage, and compliance across the API lifecycle.
Stas Neyman
Navigating the Next Chapter in Corporate Renewable Energy
1 month 1 week ago
Margot Hines
Why AI-Powered Firewall Defense Is the Boldest Cybersecurity Shift of 2025
1 month 2 weeks ago
Static firewalls are failing. Discover how AI-powered firewalls predict, adapt, and defend at machine speed — reshaping cybersecurity in 2025 and beyond.
Ramita Singh
AI Pulse: AI Bot Mitigation Is Increasing Everywhere
1 month 2 weeks ago
Tom Emmons
Learning from the LockBit Takedown
1 month 2 weeks ago
Dean Houari
The Differences Between API Gateway and WAAP — and Why You Need Both
1 month 2 weeks ago
Danielle Walter
How to Get Started with NVIDIA cuOpt
1 month 2 weeks ago
A simple guide to get started with cuOpt, an open source, GPU-accelerated solver for decision optimization.
Atalay Kutlay
Protect Hype Events: Bot-Proof Launches with Akamai and Queue-it
1 month 2 weeks ago
Emily Lyons
How to Automate Your Security Posture for the 47-Day Certificate Era
1 month 2 weeks ago
Brian Fahey
How to Prevent Command Injection and SQL Injection Attacks over MCP
1 month 3 weeks ago
Noam Atias & Maxim Zavodchik
AI Pulse: OpenAI’s Wild Bot Behavior After GPT-5
1 month 3 weeks ago
The AI Pulse series breaks down traffic trends and what they mean for apps, APIs, and businesses. In this post, read how OpenAI’s bots are changing after GPT-5.
Rob Lester
Linode Kubernetes Engine Optimization: Save on Compute, Storage, and Networking
1 month 3 weeks ago
Prasoon Pushkar
Akamai Named a Gartner Peer Insights Customers’ Choice for WAAP Six Years in a Row
1 month 4 weeks ago
Danielle Walter
A Guide to International Post-Quantum Cryptography Standards
1 month 4 weeks ago
Jan Schaumann
AI Inference Hardware Decisions: When to Choose CPUs vs. GPUs
1 month 4 weeks ago
Joseph Glover
Identity-Centric Security: ICAM as a Mission Advantage
2 months ago
Jacob Abrams & Jim Black
DNS Hijacking 101: How It Happens and What You Can Do to Prevent It
2 months ago
Sam Preston
The Power of Data Observability: Your Edge in a Fast-Changing World
2 months ago
Andy d'Andilly
How to Secure Enterprise Networks by Identifying Malicious IP Addresses
2 months ago
Ido Sakazi & Yonatan Gilvarg
Checked
4 hours 32 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed