The Akamai Blog
Spin JS/TS Router Showdown: Hono vs Itty vs Manual Routing
1 year ago
A performance comparison of three routing approaches in Spin JS/TS apps — Hono, Itty, and manual routing — with benchmarks and guidance.
Thorsten Hans
Akamai Firewall for AI: Get Powerful Protection for New LLM App Threats
1 year ago
Protect against LLM attacks such as prompt injection, exfiltration and extraction, and toxic AI outputs with Akamai Firewall for AI.
Christine Ferrusi Ross
Combat Rising Account Abuse: Akamai and Ping Identity Partner Up
1 year ago
Emily Lyons
Portability and Developer Control: 5 Key Takeaways from NAB 2025
1 year ago
Pavel Despot
AI Is Starting to Flex Its Network Security Muscles
1 year ago
Garrett Weber
Capture, Replicate, Deploy: Image Service Upgrades Now Available
1 year ago
Maddie Presland
Deployments to Dollars: Turning Services into Recurring Revenue
1 year ago
Adam Mittler
A Sustainability Program with Regional Nuance
1 year 1 month ago
Owen Mattison
Routing in Spin Apps with Hono
1 year 1 month ago
Learn how to use Hono to build full-fledged HTTP APIs with Spin and TypeScript, including middleware, route parameters, and key-value store integration.
Thorsten Hans
The AI-Powered Reboot: Rethinking Defense for Web Apps and APIs
1 year 1 month ago
Tricia Howard
Helping Our Customers Develop a Sustainability Strategy
1 year 1 month ago
Owen Mattison
Data Is on the Menu — and AI’s Market Price Is High
1 year 1 month ago
Tricia Howard
Akamai API Security Enhancements
1 year 1 month ago
Stas Neyman
API Security Is Key to Cyber Resilience in Media and Entertainment
1 year 1 month ago
For media and entertainment companies, API expansion means a broader attack surface. Security needs to stay a step ahead.
Beata Majek-Adamczyk
What Are the Benefits of a Microservices Architecture?
1 year 1 month ago
Pavel Despot
Private Networking in Distributed Compute Regions with VPC
1 year 1 month ago
Maddie Presland
Sharing Is (Not) Caring: How Shared Credentials Open the Door to Breaches
1 year 1 month ago
Tomer Peled
Cloud Migration Strategy: The Step-By-Step Framework and Benefits
1 year 1 month ago
Pavel Despot
What Is DNSSEC, and How Does It Work?
1 year 1 month ago
Sam Preston
Checked
13 hours 4 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed