The Akamai Blog
Slipping Through the Security Gaps: The Rise of Application and API Attacks
1 year 7 months ago
Badette Tribbey & Steve Winterfeld
Simplify Access Security: Integrate ZTNA with Your Cloud Identity Solution
1 year 7 months ago
Sanjay Sadarangani
Akamai Foundation: Our Values in Action in 2022
1 year 7 months ago
Natalie Billingham
Akamai?s Perspective on April?s Patch Tuesday 2023
1 year 7 months ago
Akamai Security Intelligence Group
Investigating the resurgence of the Mexals campaign
1 year 7 months ago
Stiv Kupchik
Get More from Your Player Analytics and CDN Logs with CMCD
1 year 7 months ago
Will Law
Akamai?s 2022 ESG Impact Report
1 year 7 months ago
Aaron Ahola
How to Be Prepared in the Age of Cyber Insecurity
1 year 7 months ago
Marta Fydrych-Gasowska
Hacktivists Return with DDoS Attacks, and Their Eyes on European Banks
1 year 7 months ago
Cheryl Chiodi
Akamai Managed Security Service: New Expert Help to Protect from Attacks
1 year 7 months ago
Stacey Sweeney
How Can We Satisfy the Cloud Needs of SaaS?
1 year 7 months ago
Warren Parti
Improving the Gamer Experience with Low-Latency Microservices
1 year 7 months ago
Pavel Despot
The Most Common Combosquatting Keyword Is ?Support?
1 year 7 months ago
Stijn Tilborghs & Kamil Jarosz
Why a Distributed Cloud Is Perfect for Streaming
1 year 7 months ago
Shane Keats
What?s New for Developers: March 2023
1 year 7 months ago
Jessica Capuano Mora
What Is Cloud Architecture?
1 year 7 months ago
What is cloud architecture? And what types of clouds are there? Cloud architecture defines how all the components that enable cloud computing come together.
Pavel Despot
What the NIS2 Directive Means for Your Business and Your APIs
1 year 7 months ago
Learn how implementing a comprehensive cybersecurity program that addresses all aspects of API security can ensure compliance with the NIS2 Directive.
Steven Duckaert
Chatbots, Celebrities, and Victim Retargeting: Why Crypto Giveaway Scams Are Still So Successful
1 year 7 months ago
Shiran Guez
Defeating Triple Extortion Ransomware: The Potent Combo of Ransomware and DDoS Attacks
1 year 8 months ago
Protect your organization from triple extortion ransomware ? the devastating combination of ransomware and a DDoS attack ? with these four steps.
Venkat Praneeth Nangineni & Steve Winterfeld
Checked
5 hours 31 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed