The Akamai Blog
What 400 Executives Reveal About the Future of AI Adoption
1 month 3 weeks ago
Learn how a Forrester study discovered that most companies are already using AI for competitive differentiation, personalization, and customer retention.
Vineeth Varughese
Reliable, Compliant APIs with Akamai Managed Service for API Performance
1 month 3 weeks ago
Introducing Akamai’s new product that blends proactive testing, expert analysis, and tailored optimization to help APIs stay reliable, responsive, and compliant.
Leslie Stansbury
10 Evaluation Points for Your App Platform on Kubernetes
1 month 3 weeks ago
Prasoon Pushkar
Akamai Is the 2025 Customers' Choice in Online Fraud Detection
1 month 3 weeks ago
Emily Lyons
From Scraping to Paying: Monetizing AI Bots at the Edge
2 months ago
Emily Lyons
Introducing Akamai Partner Connect: Built with You, for You
2 months ago
Pablo Onnias
Move Over, DDoS: It’s the Era of Distributed Denial of Defense (DDoD)
2 months ago
Sven Dummer, Sandeep Rath & Dennis Birchard
How Companies Are Balancing AI Innovation with Risk
2 months ago
A new Forrester report, commissioned by Akamai, reveals how companies are pursuing AI innovation at scale without exposure to unacceptable levels of risk.
Ari Weil
AI Training Data: Winning in the AI Boom
2 months ago
Jagdish Mohite
Boost the Performance and Security — and Lower the Costs — of AI Apps
2 months ago
Elan Shanker & Christine Ferrusi Ross
Understand the Attack Surface: Retail Supply Chain Cybersecurity Risks
2 months 1 week ago
Jim Black
Off Your Docker: Exposed APIs Are Targeted in New Malware Strain
2 months 1 week ago
Yonatan Gilvarg
Your AI Strategy Is Only as Strong as Your DNS
2 months 1 week ago
Sandra Murphy
Your AI Strategy Is Only as Strong as Your DNS
2 months 1 week ago
Sandra Murphy
Certificate Chaos and the Case for Automated Posture Management
2 months 1 week ago
Sandra Murphy & Sven Dummer
Breach Highlights AI and API Vulnerabilities in Software Supply Chains
2 months 1 week ago
Christine Ferrusi Ross
Virtualized (In)Security: How Attackers Can Weaponize VBS Enclaves
2 months 1 week ago
Read about Ori David’s presentation at DEF CON 33 and learn how attackers can abuse VBS enclaves, a Windows security feature, for malicious purposes.
Ori David
Akamai Enables Post-Quantum Cryptography on the Edge
2 months 1 week ago
Learn about the latest development in our post-quantum journey: Support for post-quantum cryptography on the Akamai edge.
Jan Schaumann
These 4 Threats to AI Applications Require New Cybersecurity Strategies
2 months 2 weeks ago
Learn about the four threat categories that today’s cybersecurity teams must address to protect their companies’ AI investments.
Swati Kumar
Checked
50 minutes 51 seconds ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed