The Akamai Blog
Virtualized (In)Security: How Attackers Can Weaponize VBS Enclaves
4 weeks ago
Read about Ori David’s presentation at DEF CON 33 and learn how attackers can abuse VBS enclaves, a Windows security feature, for malicious purposes.
Ori David
Akamai Enables Post-Quantum Cryptography on the Edge
4 weeks 1 day ago
Learn about the latest development in our post-quantum journey: Support for post-quantum cryptography on the Akamai edge.
Jan Schaumann
These 4 Threats to AI Applications Require New Cybersecurity Strategies
1 month ago
Learn about the four threat categories that today’s cybersecurity teams must address to protect their companies’ AI investments.
Swati Kumar
CVE-2025-54142: HTTP Request Smuggling via OPTIONS + Body
1 month ago
Learn how Akamai InfoSec mitigated CVE-2025-54142 — an HTTP request smuggling vulnerability arising from OPTIONS requests with a body.
Akamai InfoSec
BadSuccessor Is Dead, Long Live BadSuccessor(?)
1 month ago
Read about Microsoft’s patch for BadSuccessor — a vulnerability in Windows Server Active Directory — and learn why its underlying mechanics still matter.
Yuval Gordon
Protect Critical Infrastructure: Cybersecurity Strategies for Governments
1 month ago
Learn actionable strategies that can help state and local governments protect critical infrastructure and dramatically reduce risk exposure.
Douglas Holland
Marginal Emissions Rates: See Carbon Emissions with Clarity in Real Time
1 month 1 week ago
Learn how Akamai is using marginal emissions rates to improve the transparency and accuracy of our emissions accounting.
Katie Robinson
A New Way to Manage Property Configurations: Dynamic Rule Updates
1 month 1 week ago
Karthik Prabhu
Stop LLM Attacks: How Security Helps AI Apps Achieve Their ROI
1 month 1 week ago
AI security is a business problem. Protect your LLM application investment and ROI by connecting your security team with business stakeholders.
Christine Ferrusi Ross
Akamai Beats Other WAAP Vendors in Third-Party Evaluation
1 month 1 week ago
Danielle Walter
Accelerating Secure Enterprise Kubernetes Adoption
1 month 2 weeks ago
Learn how LKE-E solves critical problems while providing streamlined adoption, operational simplicity, and cost efficiency at scale.
Patrick Jamal
Akamai Named an Overall Leader for API Security by KuppingerCole
1 month 2 weeks ago
Stas Neyman
The Edge of Agency: Defending Against the Risks of Agentic AI
1 month 2 weeks ago
Maxim Zavodchik
The Reality of Modern Cyberattacks: Lessons from Recent Retail Breaches
1 month 2 weeks ago
Jim Black
Akamai and Bitmovin: Revolutionizing Live and On-Demand Video Streaming
1 month 2 weeks ago
Discover how Akamai and Bitmovin’s partnership reduces costs, enhances performance, and delivers personalized video experiences to content providers.
Adam Massaro
A Coordinated Response to MadeYouReset HTTP/2 Protocol Attacks
1 month 2 weeks ago
Mike Bishop
From Discovery to Testing: Akamai and Snyk Deliver Seamless API Security
1 month 3 weeks ago
Stas Neyman
Visualize Security Success with the Security Summary Dashboard
1 month 3 weeks ago
Jim Black
CVE-2025-32094: HTTP Request Smuggling Via OPTIONS + Obsolete Line Folding
1 month 3 weeks ago
In March 2025, Akamai received a bug bounty report identifying an HTTP Request Smuggling vulnerability that was quickly resolved for all customers.
Akamai InfoSec
Checked
6 hours 33 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed