This resource is no longer available

Cover Image

According to a Verizon Data Breach Investigation Report, nearly 70% of reported data breaches were executed through web applications.

In this webinar, walk through several case studies of malicious attacks that have occurred across the ThreatX customer base. Examine multiple attacker techniques including how they work, the risks they raise to your apps, and strategies to counter them.

Watch the video to learn:

  • How attackers are flying under the radar
  • How automated attacks such as credential stuffing, carding, account take-over, fake account creation, and password attacks happen
  • The challenges of dealing with attackers hiding behind valid proxy services
Vendor:
ThreatX
Premiered:
Aug 6, 2021
Format:
Video
Type:
Webcast

This resource is no longer available.