The Akamai Blog
Akamai and Bitmovin: Revolutionizing Live and On-Demand Video Streaming
3 months 3 weeks ago
Discover how Akamai and Bitmovin’s partnership reduces costs, enhances performance, and delivers personalized video experiences to content providers.
Adam Massaro
Agentic AI: How Autonomous Agents are Changing the Game
3 months 3 weeks ago
Vineeth Varughese
A Coordinated Response to MadeYouReset HTTP/2 Protocol Attacks
3 months 3 weeks ago
Mike Bishop
From Discovery to Testing: Akamai and Snyk Deliver Seamless API Security
3 months 3 weeks ago
Stas Neyman
Visualize Security Success with the Security Summary Dashboard
3 months 3 weeks ago
Jim Black
CVE-2025-32094: HTTP Request Smuggling Via OPTIONS + Obsolete Line Folding
3 months 4 weeks ago
In March 2025, Akamai received a bug bounty report identifying an HTTP Request Smuggling vulnerability that was quickly resolved for all customers.
Akamai InfoSec
Post-Quantum Cryptography Implementation Considerations in TLS
3 months 4 weeks ago
Jan Schaumann
AI in Cloud Computing: How AI Is Revolutionizing the Landscape
4 months ago
Discover how AI in cloud computing is transforming industries. Learn about the differences between cloud AI and edge AI — their benefits, use cases, and solutions.
Pavel Despot
Open Source & Fully Managed: Aiven-Powered Databases on Akamai
4 months ago
Peter Sari (Peter Sari)
Why the Right Tool — and the Right Team — Are Essential for DNS Security
4 months ago
Derek Hammack
Why AI Systems Use Vector Databases to Improve Performance and Reduce Costs
4 months ago
Amit Mohanty
Gartner Market Guide: Microsegmentation for Zero Trust and Resilience
4 months ago
Shivangi Sahu
3 Key Areas to Focus on When You're Evaluating AI Security
4 months ago
Berk Veral
Publishers: How to Block AI Bots and Reclaim Control of Your Content
4 months ago
Mani Sundaram
The Price of Poor Cybersecurity in 2024: US$3.1 Billion
4 months ago
Jim Black
Surviving the Ransomware Gauntlet: A Test of Resilience
4 months 1 week ago
Tricia Howard & Maria Vlasak
Beyond Perimeter Defense: Implementing Zero Trust in Federal Agencies
4 months 1 week ago
Learn how to address cybersecurity in this new perimeter-less world and get six steps to achieving Least Permissive Trust for federal agencies.
Micah Maryn
CISA Recommends Segmentation & Zero Trust to Combat Interlock Ransomware
4 months 1 week ago
Jacob Abrams
Coyote in the Wild: First-Ever Malware That Abuses UI Automation
4 months 2 weeks ago
Tomer Peled
Checked
5 hours 14 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed