The Akamai Blog
Beyond Perimeter Defense: Implementing Zero Trust in Federal Agencies
4 days 11 hours ago
Learn how to address cybersecurity in this new perimeter-less world and get six steps to achieving Least Permissive Trust for federal agencies.
Micah Maryn
CISA Recommends Segmentation & Zero Trust to Combat Interlock Ransomware
6 days ago
Jacob Abrams
Coyote in the Wild: First-Ever Malware That Abuses UI Automation
1 week ago
Tomer Peled
Understand the SharePoint RCE: Exploitations, Detections, and Mitigations
1 week ago
Akamai Security Intelligence Group
Why Customer Experience Is the New Battleground in Zero Trust
1 week 1 day ago
Learn why being named a Customer Favorite in Forrester's Zero Trust Wave reveals what we believe really matters in cybersecurity.
Jim Black
How Search Engines, LLMs, and Third-Party Scrapers Affect Bot Management
1 week 2 days ago
Christine Ferrusi Ross
Optimizing Government Websites for Peak Traffic Events
1 week 4 days ago
Learn how to proactively withstand peak traffic events and improve your government website?s performance and security posture.
Craig Eaton & Eric Bach
Vulnerable to Bulletproof: Protect TLS via Certificate Posture Management
1 week 5 days ago
Sam Preston
Cloud Cost Conundrum: Rising Expenses Hinder AI Innovation in Europe
1 week 5 days ago
Ari Weil
AI and LLM Bot Management Has Become a Business-Critical Issue: Do It Right
2 weeks ago
AI bots, agents, and LLM scrapers all want your content. Here?s how to manage them so that they help, not hinder, your business.
Tom Emmons
From VPN to Zero Trust: Why It?s Time to Retire Traditional VPNs, Part 2
2 weeks ago
Elad Lev & Jim Black
An Intentionally Engineered Platform for a More Responsible Internet
2 weeks 1 day ago
Learn how Akamai delivers performance, security, and scale on a platform that's also built for sustainability.
Owen Mattison
How AI Bots Are Rewriting the Rules of Publishing
2 weeks 5 days ago
See how AI bots impact publishers and how Akamai helps you protect, control, and monetize your content as AI reshapes how people find information.
Emily Lyons
Mitigating CitrixBleed 2 (CVE?2025?5777) NetScaler Memory Disclosure with App & API Protector
2 weeks 6 days ago
Akamai Security Intelligence Group
Protect Client-Side Code and Certify the Authenticity of Data Collection
3 weeks ago
David S�n�cal
Real Performance Improvements 2025
3 weeks 5 days ago
Tim Vereecke & Robin Marx
Agentic AI Is Here ? and It?s Shaping the Future of Bot Defense
3 weeks 6 days ago
Tsvika Klein
Operationalize Day-2 Services for API Security and Microsegmentation
4 weeks ago
Learn how to turn post-deployment services into a revenue opportunity and provide ongoing value for your customers with industry-leading tools and service playbooks.
Adam Mittler
Commitment to Powering Europe?s Digital Sovereignty and Competitiveness
4 weeks ago
Akamai remains committed to supporting our customers? European digital sovereignty with our suite of robust, secure, and high-performing solutions.
Natalie Billingham
Checked
2 hours 47 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed