Marginal Emissions Rates: See Carbon Emissions with Clarity in Real Time The Akamai Blog 4 weeks 1 day ago Learn how Akamai is using marginal emissions rates to improve the transparency and accuracy of our emissions accounting. Katie Robinson
A New Way to Manage Property Configurations: Dynamic Rule Updates The Akamai Blog 1 month ago Karthik Prabhu
Stop LLM Attacks: How Security Helps AI Apps Achieve Their ROI The Akamai Blog 1 month ago AI security is a business problem. Protect your LLM application investment and ROI by connecting your security team with business stakeholders. Christine Ferrusi Ross
Akamai Beats Other WAAP Vendors in Third-Party Evaluation The Akamai Blog 1 month ago Danielle Walter
Accelerating Secure Enterprise Kubernetes Adoption The Akamai Blog 1 month ago Learn how LKE-E solves critical problems while providing streamlined adoption, operational simplicity, and cost efficiency at scale. Patrick Jamal
Akamai Named an Overall Leader for API Security by KuppingerCole The Akamai Blog 1 month 1 week ago Stas Neyman
The Edge of Agency: Defending Against the Risks of Agentic AI The Akamai Blog 1 month 1 week ago Maxim Zavodchik
The Reality of Modern Cyberattacks: Lessons from Recent Retail Breaches The Akamai Blog 1 month 1 week ago Jim Black
Akamai and Bitmovin: Revolutionizing Live and On-Demand Video Streaming The Akamai Blog 1 month 1 week ago Discover how Akamai and Bitmovin?s partnership reduces costs, enhances performance, and delivers personalized video experiences to content providers. Adam Massaro
A Coordinated Response to MadeYouReset HTTP/2 Protocol Attacks The Akamai Blog 1 month 1 week ago Mike Bishop
From Discovery to Testing: Akamai and Snyk Deliver Seamless API Security The Akamai Blog 1 month 1 week ago Stas Neyman
Visualize Security Success with the Security Summary Dashboard The Akamai Blog 1 month 1 week ago Jim Black
CVE-2025-32094: HTTP Request Smuggling Via OPTIONS + Obsolete Line Folding The Akamai Blog 1 month 2 weeks ago In March 2025, Akamai received a bug bounty report identifying an HTTP Request Smuggling vulnerability that was quickly resolved for all customers. Akamai InfoSec
Post-Quantum Cryptography Implementation Considerations in TLS The Akamai Blog 1 month 2 weeks ago Jan Schaumann
AI in Cloud Computing: How AI Is Revolutionizing the Landscape The Akamai Blog 1 month 2 weeks ago Discover how AI in cloud computing is transforming industries. Learn about the differences between cloud AI and edge AI ? their benefits, use cases, and solutions. Pavel Despot
Why the Right Tool ? and the Right Team ? Are Essential for DNS Security The Akamai Blog 1 month 2 weeks ago Derek Hammack
Gartner Market Guide: Microsegmentation for Zero Trust and Resilience The Akamai Blog 1 month 3 weeks ago Shivangi Sahu
3 Key Areas to Focus on When You're Evaluating AI Security The Akamai Blog 1 month 3 weeks ago Berk Veral
Publishers: How to Block AI Bots and Reclaim Control of Your Content The Akamai Blog 1 month 3 weeks ago Mani Sundaram
The Price of Poor Cybersecurity in 2024: US$3.1 Billion The Akamai Blog 1 month 3 weeks ago Jim Black