The Akamai Blog
Introducing New Networking Capabilities for LKE-Enterprise
6 months ago
Modern enterprise applications require a robust, scalable, and secure networking infrastructure.
Prasoon Pushkar
Fog Computing vs. Edge Computing: Their Roles in Modern Technology
6 months ago
Fog computing vs. edge computing: Understand how they compare, their unique benefits, and which is best for your data processing needs in IoT and beyond.
Mike Elissen
Navigating the Future of Scope 2: Balancing Impact and Practicality
6 months ago
The Greenhouse Gas Protocol’s Scope 2 revisions demand thoughtful action. Read how we’re prioritizing meaningful, measurable impact over rapid progress.
Mike Mattera
Fog Computing vs. Edge Computing: Their Roles in Modern Technology
6 months ago
Fog computing vs. edge computing: Understand how they compare, their unique benefits, and which is best for your data processing needs in IoT and beyond.
Mike Elissen
Why It’s Time to Retire Traditional VPNs, Part 1
6 months ago
Elad Lev & Jim Black
Honoring Innovation, Growth, and Collaboration: The Akamai Partner Awards
6 months ago
Introducing the Akamai Partner Awards, which recognize excellence — both organizational and individual — in sales, services, marketing, and technical impact.
Prince Jason Albert
Introducing Akamai DNS Posture Management
6 months ago
Sandra Murphy
The Akamai Innovation Tour: A Journey in Perspective and Partnership
6 months ago
“What does innovation mean to you?” Read how one marketer answered that question after attending the 2025 Akamai Innovation Tour.
Nick Watkins
Damage Control: Why Building Cyber Resilience Is Non-Negotiable
6 months 1 week ago
It’s only a matter of time before attackers find a crack in your security armour. Learn how to combine resilience with compliance and protect what matters most.
Richard Meeus
App Platform Updates: Customizable Catalog, Git-Based Secrets Management, and Automated Management of K8s Projects
6 months 1 week ago
In this blog, we’ll shortly touch on App Platform’s new features and improvements, plus we’ll look ahead at some major changes that are in our pipeline.
Sander Rodenhuis (Sander Rodenhuis)
AI in Cybersecurity: How AI Is Impacting the Fight Against Cybercrime
6 months 1 week ago
AI is transforming cybersecurity. Explore how hackers use AI for cybercrimes and how cybersecurity experts use AI to prevent, detect, and respond to attacks.
Christine Ferrusi Ross
Forget Perfect Prevention — Build Cyber Resilience Instead
6 months 2 weeks ago
Discover why shifting from cyberattack prevention to cyber resilience is the key to survival in today’s relentless cyberthreat landscape.
Brent Maynard
The Rise of the LLM AI Scrapers: What It Means for Bot Management
6 months 2 weeks ago
Explore the rise of LLM AI scrapers and learn how to adapt to growing bot traffic with data-backed insights from our research.
Tom Emmons & Rob Lester
The Rise of the LLM AI Scrapers: What It Means for Bot Management
6 months 2 weeks ago
Explore the rise of LLM AI scrapers and learn how to adapt to growing bot traffic with data-backed insights from our research.
Tom Emmons & Robert Lester
BadSuccessor: Abusing dMSA to Escalate Privileges in Active Directory
6 months 2 weeks ago
Akamai researchers found a privilege escalation vulnerability in Windows Server 2025 that allows attackers to compromise any user in Active Directory.
Yuval Gordon
Fine-Tuning Your Managed Databases: Optimize Performance with Advanced Parameters
6 months 2 weeks ago
Managed database services (DBaaS) provide a powerful and scalable approach to deploying and managing databases without the overhead of manual maintenance.
Peter Sari (Peter Sari)
Compliance Insights: How to Stop Lateral Movement and Boost Authorization
6 months 2 weeks ago
Stop lateral movement before it starts. Learn how to meet security compliance regulations with layered security, microsegmentation, and smart API protection.
John Natale
Scope 3, Category 8: What Akamai Is Doing for Customer Reporting
6 months 2 weeks ago
Mike Mattera
Locked Out and Held for Ransom: A City's Battle Against Cybercrime
6 months 3 weeks ago
Read how having a plan and doing some preparation in advance can lessen the severity of a ransomware attack — or prevent one altogether.
Douglas Holland
Checked
4 hours 28 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed