The Akamai Blog
Stop LLM Attacks: How Security Helps AI Apps Achieve Their ROI
5 months ago
AI security is a business problem. Protect your LLM application investment and ROI by connecting your security team with business stakeholders.
Christine Ferrusi Ross
Akamai Beats Other WAAP Vendors in Third-Party Evaluation
5 months ago
Danielle Walter
Benchmarking VPUs and GPUs for Media Workloads
5 months 1 week ago
Chris Milsted
Accelerating Secure Enterprise Kubernetes Adoption
5 months 1 week ago
Learn how LKE-E solves critical problems while providing streamlined adoption, operational simplicity, and cost efficiency at scale.
Patrick Jamal
How Cloud Wrapper Evolved to Optimize Small-Object Caching
5 months 1 week ago
Learn how Akamai's Cloud Wrapper evolved to optimize small-object caching, reduce egress costs, and boost SEO rankings for web and media assets.
Ansley Flanagan
Akamai Named an Overall Leader for API Security by KuppingerCole
5 months 1 week ago
Stas Neyman
The Edge of Agency: Defending Against the Risks of Agentic AI
5 months 1 week ago
Maxim Zavodchik
The Reality of Modern Cyberattacks: Lessons from Recent Retail Breaches
5 months 1 week ago
Jim Black
Generative Personalization at the Edge: The Future of E‑Commerce Isn’t (Just) in the Cloud
5 months 1 week ago
Pedro Salvado
Akamai and Bitmovin: Revolutionizing Live and On-Demand Video Streaming
5 months 1 week ago
Discover how Akamai and Bitmovin’s partnership reduces costs, enhances performance, and delivers personalized video experiences to content providers.
Adam Massaro
Agentic AI: How Autonomous Agents are Changing the Game
5 months 1 week ago
Vineeth Varughese
A Coordinated Response to MadeYouReset HTTP/2 Protocol Attacks
5 months 1 week ago
Mike Bishop
From Discovery to Testing: Akamai and Snyk Deliver Seamless API Security
5 months 2 weeks ago
Stas Neyman
Visualize Security Success with the Security Summary Dashboard
5 months 2 weeks ago
Jim Black
CVE-2025-32094: HTTP Request Smuggling Via OPTIONS + Obsolete Line Folding
5 months 2 weeks ago
In March 2025, Akamai received a bug bounty report identifying an HTTP Request Smuggling vulnerability that was quickly resolved for all customers.
Akamai InfoSec
Post-Quantum Cryptography Implementation Considerations in TLS
5 months 2 weeks ago
Jan Schaumann
AI in Cloud Computing: How AI Is Revolutionizing the Landscape
5 months 3 weeks ago
Discover how AI in cloud computing is transforming industries. Learn about the differences between cloud AI and edge AI — their benefits, use cases, and solutions.
Pavel Despot
Open Source & Fully Managed: Aiven-Powered Databases on Akamai
5 months 3 weeks ago
Peter Sari (Peter Sari)
Why the Right Tool — and the Right Team — Are Essential for DNS Security
5 months 3 weeks ago
Derek Hammack
Checked
53 minutes 2 seconds ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed