The Akamai Blog
The Do’s and Don’ts of Modern API Security
1 year 11 months ago
Abigail Ojeda
Women Can Make a Difference in the Field of Data Science
1 year 11 months ago
Tashema Nichols-Jones
Novel Detection of Process Injection Using Network Anomalies
1 year 11 months ago
Ofir Shen
Insights from Survey of Financial Services Cyber Leaders in Asia-Pacific
1 year 11 months ago
Cheryl Chiodi
Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 2
1 year 11 months ago
Ben Barnea
Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 1
1 year 11 months ago
Ben Barnea
The Shift to Distributed Cloud: The Next Era of Cloud Infrastructure
1 year 11 months ago
Mike Maney
Akamai’s Perspective on December’s Patch Tuesday 2023
1 year 11 months ago
Akamai Security Intelligence Group
How to Defend Against Digital Cyberthreats This Holiday Season
1 year 11 months ago
Reuben Koh
What We've Learned from Media Cloud Adoption Trends
1 year 11 months ago
Read the top takeaways from a global survey of leaders in the media and entertainment industry about their cloud adoption experiences and challenges.
Todd Loewenstein & Peter Chave
Observed Exploitation Attempts of Struts 2 S2-066 Vulnerability (CVE-2023-50164)
1 year 11 months ago
The Akamai Security Intelligence Group has seen numerous exploitation attempts on Apache Struts 2 since December 7, 2023, when a critical CVE was released.
Maxim Zavodchik, Sam Tinklenberg, Neeraj Pradeep & Noam Atias
Actively Exploited Vulnerability in QNAP VioStor NVR: Fixed, Patches Available
1 year 11 months ago
Chad Seaman & Larry Cashdollar
Our Top Takeaways from 2023 Gartner® Market Guide for Microsegmentation
1 year 11 months ago
Ravit Greitser
Improve Performance with HTTP/2 Stream Prioritization
2 years ago
Mihai Puchiu & Julio Chaves Herrera
Akamai EdgeWorkers for SaaS: Balancing Customization and Security
2 years ago
Aaron Alquist
Going Cloud Native, and What “Portability” Really Means
2 years ago
Jay Jenkins
Spoofing DNS Records by Abusing DHCP DNS Dynamic Updates
2 years ago
Ori David
November’s Shopping Holidays: Online Shopping, Sales, and Magecart Attacks
2 years ago
Gal Meiri
Monolith Versus Microservices: Weigh the Pros and Cons of Both Configs
2 years ago
Pavel Despot
Checked
2 hours 46 minutes ago
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
The Akamai Blog feed