Akamai and Bitmovin: Revolutionizing Live and On-Demand Video Streaming The Akamai Blog 3 months ago Discover how Akamai and Bitmovin’s partnership reduces costs, enhances performance, and delivers personalized video experiences to content providers. Adam Massaro
Agentic AI: How Autonomous Agents are Changing the Game The Akamai Blog 3 months ago Vineeth Varughese
A Coordinated Response to MadeYouReset HTTP/2 Protocol Attacks The Akamai Blog 3 months ago Mike Bishop
From Discovery to Testing: Akamai and Snyk Deliver Seamless API Security The Akamai Blog 3 months 1 week ago Stas Neyman
Visualize Security Success with the Security Summary Dashboard The Akamai Blog 3 months 1 week ago Jim Black
CVE-2025-32094: HTTP Request Smuggling Via OPTIONS + Obsolete Line Folding The Akamai Blog 3 months 1 week ago In March 2025, Akamai received a bug bounty report identifying an HTTP Request Smuggling vulnerability that was quickly resolved for all customers. Akamai InfoSec
Post-Quantum Cryptography Implementation Considerations in TLS The Akamai Blog 3 months 2 weeks ago Jan Schaumann
AI in Cloud Computing: How AI Is Revolutionizing the Landscape The Akamai Blog 3 months 2 weeks ago Discover how AI in cloud computing is transforming industries. Learn about the differences between cloud AI and edge AI — their benefits, use cases, and solutions. Pavel Despot
Open Source & Fully Managed: Aiven-Powered Databases on Akamai The Akamai Blog 3 months 2 weeks ago Peter Sari (Peter Sari)
Why the Right Tool — and the Right Team — Are Essential for DNS Security The Akamai Blog 3 months 2 weeks ago Derek Hammack
Why AI Systems Use Vector Databases to Improve Performance and Reduce Costs The Akamai Blog 3 months 2 weeks ago Amit Mohanty
Gartner Market Guide: Microsegmentation for Zero Trust and Resilience The Akamai Blog 3 months 2 weeks ago Shivangi Sahu
3 Key Areas to Focus on When You're Evaluating AI Security The Akamai Blog 3 months 2 weeks ago Berk Veral
Publishers: How to Block AI Bots and Reclaim Control of Your Content The Akamai Blog 3 months 2 weeks ago Mani Sundaram
The Price of Poor Cybersecurity in 2024: US$3.1 Billion The Akamai Blog 3 months 2 weeks ago Jim Black
Surviving the Ransomware Gauntlet: A Test of Resilience The Akamai Blog 3 months 3 weeks ago Tricia Howard & Maria Vlasak
Beyond Perimeter Defense: Implementing Zero Trust in Federal Agencies The Akamai Blog 3 months 3 weeks ago Learn how to address cybersecurity in this new perimeter-less world and get six steps to achieving Least Permissive Trust for federal agencies. Micah Maryn
CISA Recommends Segmentation & Zero Trust to Combat Interlock Ransomware The Akamai Blog 3 months 3 weeks ago Jacob Abrams
Coyote in the Wild: First-Ever Malware That Abuses UI Automation The Akamai Blog 3 months 4 weeks ago Tomer Peled
Understand the SharePoint RCE: Exploitations, Detections, and Mitigations The Akamai Blog 3 months 4 weeks ago Akamai Security Intelligence Group