The Akamai Blog
Anatomy of a SYN-ACK Attack
2 days 10 hours ago
Chad Seaman
Enhancing Public Sector Cybersecurity with Akamai API Security
1 week ago
Learn how Akamai's API security solution helps federal agencies identify, protect, and monitor API traffic in real time.
Stephen Ringo
To Meet Compliance Challenges, Focus on Building Great Security
1 week ago
Tony Lauro
Emissions Transparency: Moving Toward a More Rigorous Verification
1 week 1 day ago
Katie Robinson
Akamai Wins Best Sales Leadership Development Program from Brandon Hall
1 week 2 days ago
Learn how Akamai's award-winning sales leadership development program transforms sales managers into impactful coaches, driving growth and performance.
Chelsey Pine
Akamai?s Channel-First Strategy: Driving Partner Success in 2025
1 week 3 days ago
Customer success is Akamai?s priority ? and our many industry awards highlight how we've empowered our partners to thrive. See what we have planned for 2025.
Janki Kaura
Detecting and Mitigating an Authorization Bypass Vulnerability in Next.js
1 week 3 days ago
Akamai Security Intelligence Group
Why AI Demands a New Security Playbook
1 week 6 days ago
Understand the new AI security threats and how Akamai can help you develop a risk mitigation strategy.
Rupesh Chokshi
Akamai Named a Leader in the Latest Forrester Report for WAF Solutions
2 weeks ago
Danielle Walter
Detecting and Mitigating Apache Tomcat CVE-2025-24813
2 weeks ago
Akamai Security Intelligence Group
The Hidden Costs and Ethical Pitfalls of Content Scraping
2 weeks 1 day ago
Read about the significant hidden costs and ethical pitfalls of content scraping ? and learn how to protect your website.
Jagdish Mohite
Cryptominers? Anatomy: Analyzing Cryptominers
2 weeks 1 day ago
Maor Dahan
Negative Exposure: Edimax Network Cameras Used to Spread Mirai
3 weeks ago
Mirai continues to plague organizations. Read how the Akamai SIRT identified a new command injection vulnerability that?s targeting Edimax devices.
Kyle Lefton & Larry Cashdollar
Detecting and Mitigating the Apache Camel Vulnerabilities
3 weeks 2 days ago
Akamai researchers have created detection scripts and additional details for the Apache Camel vulnerabilities CVE-2025-27636 and CVE-2025-29891.
Akamai Security Intelligence Group
From Good to Great: Mastering Day-2 Network Security Policy
3 weeks 2 days ago
Zohar Furman
Magecart: How Akamai Protected a Global Retailer Against a Live Attack
3 weeks 6 days ago
Gal Meiri
Why Are Airlines a Prime Target for Cyberattacks?
4 weeks 2 days ago
Jim Black & Eric Rubenov
Lightning-Fast Requests with Early Data
1 month ago
Robin Marx & Rafal Myszka
Strengthening Our Emissions Accounting Process Blog
1 month ago
Margot Hines
Checked
12 hours 47 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed