The Akamai Blog
Enhancements to Akamai API Security, Q3 2025
4 days 4 hours ago
The recent Akamai API Security updates improve visibility, automation, coverage, and compliance across the API lifecycle.
Stas Neyman
Navigating the Next Chapter in Corporate Renewable Energy
5 days 1 hour ago
Margot Hines
Why AI-Powered Firewall Defense Is the Boldest Cybersecurity Shift of 2025
6 days 4 hours ago
Static firewalls are failing. Discover how AI-powered firewalls predict, adapt, and defend at machine speed — reshaping cybersecurity in 2025 and beyond.
Ramita Singh
AI Pulse: AI Bot Mitigation Is Increasing Everywhere
1 week ago
Tom Emmons
Learning from the LockBit Takedown
1 week 4 days ago
Dean Houari
The Differences Between API Gateway and WAAP — and Why You Need Both
1 week 4 days ago
Danielle Walter
How to Get Started with NVIDIA cuOpt
1 week 4 days ago
A simple guide to get started with cuOpt, an open source, GPU-accelerated solver for decision optimization.
Atalay Kutlay
Protect Hype Events: Bot-Proof Launches with Akamai and Queue-it
1 week 4 days ago
Emily Lyons
How to Automate Your Security Posture for the 47-Day Certificate Era
1 week 4 days ago
Brian Fahey
How to Prevent Command Injection and SQL Injection Attacks over MCP
1 week 5 days ago
Noam Atias & Maxim Zavodchik
AI Pulse: OpenAI’s Wild Bot Behavior After GPT-5
2 weeks 3 days ago
The AI Pulse series breaks down traffic trends and what they mean for apps, APIs, and businesses. In this post, read how OpenAI’s bots are changing after GPT-5.
Rob Lester
Linode Kubernetes Engine Optimization: Save on Compute, Storage, and Networking
2 weeks 4 days ago
Prasoon Pushkar
Akamai Named a Gartner Peer Insights Customers’ Choice for WAAP Six Years in a Row
2 weeks 5 days ago
Danielle Walter
A Guide to International Post-Quantum Cryptography Standards
2 weeks 5 days ago
Jan Schaumann
AI Inference Hardware Decisions: When to Choose CPUs vs. GPUs
2 weeks 6 days ago
Joseph Glover
Identity-Centric Security: ICAM as a Mission Advantage
3 weeks 3 days ago
Jacob Abrams & Jim Black
DNS Hijacking 101: How It Happens and What You Can Do to Prevent It
3 weeks 5 days ago
Sam Preston
The Power of Data Observability: Your Edge in a Fast-Changing World
3 weeks 6 days ago
Andy d'Andilly
How to Secure Enterprise Networks by Identifying Malicious IP Addresses
3 weeks 6 days ago
Ido Sakazi & Yonatan Gilvarg
Checked
6 hours 4 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed