Akamai Enables Post-Quantum Cryptography on the Edge The Akamai Blog 2 months 2 weeks ago Learn about the latest development in our post-quantum journey: Support for post-quantum cryptography on the Akamai edge. Jan Schaumann
These 4 Threats to AI Applications Require New Cybersecurity Strategies The Akamai Blog 2 months 3 weeks ago Learn about the four threat categories that today’s cybersecurity teams must address to protect their companies’ AI investments. Swati Kumar
An Inside Look at our Next Gen Object Storage Launch The Akamai Blog 2 months 3 weeks ago Jason Tanabe
CVE-2025-54142: HTTP Request Smuggling via OPTIONS + Body The Akamai Blog 2 months 3 weeks ago Learn how Akamai InfoSec mitigated CVE-2025-54142 — an HTTP request smuggling vulnerability arising from OPTIONS requests with a body. Akamai InfoSec
BadSuccessor Is Dead, Long Live BadSuccessor(?) The Akamai Blog 2 months 3 weeks ago Read about Microsoft’s patch for BadSuccessor — a vulnerability in Windows Server Active Directory — and learn why its underlying mechanics still matter. Yuval Gordon
Protect Critical Infrastructure: Cybersecurity Strategies for Governments The Akamai Blog 2 months 3 weeks ago Learn actionable strategies that can help state and local governments protect critical infrastructure and dramatically reduce risk exposure. Douglas Holland
Our New Premium Managed Databases Plan for Resource-Intensive Workloads The Akamai Blog 2 months 3 weeks ago Peter Sari (Peter Sari)
Boost EdgeWorker Observability: Set Up Logging With DataStream The Akamai Blog 2 months 3 weeks ago AJ Johnson
Marginal Emissions Rates: See Carbon Emissions with Clarity in Real Time The Akamai Blog 2 months 3 weeks ago Learn how Akamai is using marginal emissions rates to improve the transparency and accuracy of our emissions accounting. Katie Robinson
A New Way to Manage Property Configurations: Dynamic Rule Updates The Akamai Blog 2 months 4 weeks ago Karthik Prabhu
Key Takeaways from KubeCon + CloudNativeCon India 2025 The Akamai Blog 2 months 4 weeks ago Prasoon Pushkar
Stop LLM Attacks: How Security Helps AI Apps Achieve Their ROI The Akamai Blog 2 months 4 weeks ago AI security is a business problem. Protect your LLM application investment and ROI by connecting your security team with business stakeholders. Christine Ferrusi Ross
Akamai Beats Other WAAP Vendors in Third-Party Evaluation The Akamai Blog 3 months ago Danielle Walter
Accelerating Secure Enterprise Kubernetes Adoption The Akamai Blog 3 months ago Learn how LKE-E solves critical problems while providing streamlined adoption, operational simplicity, and cost efficiency at scale. Patrick Jamal
How Cloud Wrapper Evolved to Optimize Small-Object Caching The Akamai Blog 3 months ago Learn how Akamai's Cloud Wrapper evolved to optimize small-object caching, reduce egress costs, and boost SEO rankings for web and media assets. Ansley Flanagan
Akamai Named an Overall Leader for API Security by KuppingerCole The Akamai Blog 3 months ago Stas Neyman
The Edge of Agency: Defending Against the Risks of Agentic AI The Akamai Blog 3 months ago Maxim Zavodchik
The Reality of Modern Cyberattacks: Lessons from Recent Retail Breaches The Akamai Blog 3 months ago Jim Black
Generative Personalization at the Edge: The Future of E‑Commerce Isn’t (Just) in the Cloud The Akamai Blog 3 months ago Pedro Salvado