All resources sponsored by:

F5 Networks

23 Matches
Credential Stuffing 2021: The Latest Attack Trends and Tools
sponsored by F5 Networks
WHITE PAPER:From the stereotypical loner in the basement to organized criminal gangs and nation states, attackers have become increasingly sophisticated over the past decade. So, how can security and fraud teams stay ahead? The key lies in using automation, machine learning and AI to create a security deterrent. Download this white paper to learn more.
Posted: 18 Oct 2021 | Published: 15 Oct 2021
Get This Now


Cloud Native Edge-as-a-Service Webinar
sponsored by F5 Networks
WEBCAST:In this webinar, join Jun Shi, RVP, Outbound Product Management at Volterra and Grace Petrucci, Sr. Industry SMM Service Provider at F5, to discuss bringing cloud-native operation to modernize app delivery from mobile core to the enterprise edge. Tune in to learn more.
Posted: 16 Sep 2021 | Premiered: Sep 16, 2021
Get This Now

TOPICS:  .NET

Developing a 5G Mobile Edge Computing Strategy
sponsored by F5 Networks
EBOOK:5G brings the convergence of telco and IT Cloud and offers new and expanded opportunities, but this convergence also introduces greater complexity. Read this e-book to fully understand how to develop a 5G mobile edge computing strategy.
Posted: 16 Sep 2021 | Published: 16 Sep 2021
Get This Now

TOPICS:  .NET

F5 Volterra Edge Cloud
sponsored by F5 Networks
EBRIEF:Centralized architectures, like most current cloud offerings, fail to provide distributed edge environments with the service delivery they need. Read this e-guide to learn more about edge cloud and how it addresses the drawbacks of centralized cloud architectures.
Posted: 13 Aug 2021 | Published: 13 Aug 2021
Get This Now

TOPICS:  Edge Computing

Web Application Firewalls (WAFs) for Dummies
sponsored by F5 Networks
EBOOK:43% of all breaches involved web applications, according to Verizon's 2020 report. A web application firewall (WAF) prevents successful attacks against your web applications. With this eBook, learn how to recognize essential WAF capabilities, integrate your application architectures, and fully understand WAF deployment options.
Posted: 25 Jun 2021 | Published: 25 Jun 2021
Get This Now

TOPICS:  .NET

Managing Digital Transformation Risk in Financial Services
sponsored by F5 Networks
RESEARCH CONTENT:With digital banking becoming a growing trend across financial institutions (with no signs of going away), embracing digital transformation turns into a critical practice for staying competitive. Read this research report to learn more about managing digital transformation risks and cybersecurity challenges in the financial service industry.
Posted: 13 Apr 2021 | Published: 30 Sep 2020
Get This Now


Financial Fraud Rising: Key Strategies to Combat Sophisticated ATO Attacks
sponsored by F5 Networks
ANALYST REPORT:The global pandemic has shifted the way commerce is transacted. The online and mobile channels for banks and retailers alike are seeing sharp increases in transaction volume. This increases the attack surface. In this white paper, learn about the myriad of challenges risk executives face as they seek to address the escalating threat environment.
Posted: 12 Apr 2021 | Published: 31 Aug 2020
Get This Now

TOPICS:  Cybersecurity

Shape Security Defends 8 of the Top 12 US Banks
sponsored by F5 Networks
WEBCAST:Join Dan Woods, a VP at Shape Security with more than 2 decades of cybersecurity experience at the FBI and CIA, as he discusses the changing cybersecurity landscape for the financial services industry, highlights the impact of FinTechs, digital banking, and more. Watch now to get started.
Posted: 09 Apr 2021 | Premiered: Apr 9, 2021
Get This Now

TOPICS:  Cybersecurity

Defeating Application Fraud
sponsored by F5 Networks
VIDEO:Applications are the most frequently targeted vector for today’s fraudsters and cybercriminals. Watch this webinar to join the Global Head of AI at F5 Networks, Shuman Ghosemajumder, as he discusses application security threat trends, the weaponization of AI, and more.
Posted: 08 Apr 2021 | Premiered: 08 Apr 2021
Get This Now

TOPICS:  Cybersecurity

Breaking the Cycle of Online Fraud
sponsored by F5 Networks
WEBCAST:Enterprise direct fraud losses are climbing – according to Juniper Research, these losses are projected to reach $48B per year by 2023. To make matters worse, current fraud tools require extensive configuration, generate uncertain risk scores and hamper user experience. View this webinar to learn a new AI-driven anti-fraud approach.
Posted: 07 Apr 2021 | Premiered: Apr 7, 2021
Get This Now


Cyber Security Myths That Are Harming Your Business
sponsored by F5 Networks
VIDEO:This webinar provides an overview of the top cybersecurity myths potentially harming your organization, exploring the origins of each, dispelling them, and offering you a more effective approach going forward – watch now to uncover each misconception.
Posted: 07 Apr 2021 | Premiered: 07 Apr 2021
Get This Now

TOPICS:  Cybersecurity

Learn How Cybercriminals Defeat CAPTCHA
sponsored by F5 Networks
WEBCAST:In this webinar, join Dan Woods – a VP from Shape Security – as he provides a comprehensive explanation (with a demonstration) as to the shortcomings of CAPTCHA and why it shouldn’t be used to protect web and mobile applications. Watch now to get started.
Posted: 06 Apr 2021 | Premiered: Apr 6, 2021
Get This Now

TOPICS:  Cybersecurity

Market Guide for Online Fraud Detection
sponsored by F5 Networks
EGUIDE:This Gartner e-guide offers a comprehensive and expert deep dive into the online fraud detection market, providing an overview of the market, an analysis of current and future trends, Gartner’s strategic recommendations, and more – read on to unlock the full e-guide.
Posted: 05 Apr 2021 | Published: 13 May 2020
Get This Now

TOPICS:  Cybersecurity

2020 PHISHING AND FRAUD REPORT
sponsored by F5 Networks
ANALYST REPORT:Phishing remains a popular method of stealing credentials, committing fraud, and distributing malware. Access this report to learn how fraudsters are building and hosting their phishing sites, the tactics they use to remain hidden, and how you can protect your business.
Posted: 02 Apr 2021 | Published: 02 Apr 2021
Get This Now

TOPICS:  Phishing

State of Application Strategy Report 2021
sponsored by F5 Networks
WHITE PAPER:Progress that might normally have taken a decade has leapt forward in a single year—with respondents maturing in their journeys toward digital expansion. Explore the new trends decision-makers will focus on in the years to come in the official 2021 F5 State of Application Strategy Report. Download the report here.
Posted: 02 Apr 2021 | Published: 02 Apr 2021
Get This Now


Attacker Economics: UNDERSTANDING THE ECONOMICS BEHIND CYBER ATTACKS—WHAT MAKES YOUR COMPANY A PRIME TARGET?
sponsored by F5 Networks
EBOOK:Automated attacks are proliferating against organizations around the globe. As the cost and investment of launching these attacks continues to plummet, companies are increasingly experiencing credential stuffing attacks that can lead to account takeover and fraud. View this e-book to learn how hacker finance leads to attacks.
Posted: 01 Apr 2021 | Published: 01 Apr 2021
Get This Now

TOPICS:  Hackers

The Industrialization of Fraud: Fighting Fire With Fire
sponsored by F5 Networks
WHITE PAPER:This white paper, The Industrialization of Fraud: Fighting Fire with Fire, provides exclusive insight into sophisticated fraud strategies and tactics, as well as a series of best practices that can be implemented to thwart fraud attempts. Read on to learn more.
Posted: 31 Mar 2021 | Published: 30 Nov 2020
Get This Now

TOPICS:  Cybersecurity

BALANCING CUSTOMER CONVENIENCE WITH CYBERSECURITY THREATS IN FINANCIAL SERVICES
sponsored by F5 Networks
EBOOK:Today’s financial services organizations are facing the increasingly difficult task of balancing customer convenience with cybersecurity. Read this e-book to learn more about the current threats in the financial industry and discover how to strike a balance between UX and protection.
Posted: 31 Mar 2021 | Published: 31 Mar 2021
Get This Now

TOPICS:  Cybersecurity

How To Integrate Security In Your DevOps Environment
sponsored by F5 Networks
EGUIDE:Application security has two challenges: Keeping pace with the evolution and sophistication of attacks, and keeping pace with the speed of modern application development...DevOps.
Posted: 29 Apr 2020 | Published: 28 Apr 2020
Get This Now


How to Protect Against the OWASP Top 10 and Beyond
sponsored by F5 Networks
RESOURCE:VERACODE NOTED THAT 72% OF ALL APPLICATIONS HAD AT LEAST ONE VULNERABILITY.
Posted: 23 Apr 2020 | Published: 23 Apr 2020
Get This Now


Automation's Rising Tide: How to Manage Bots in Today's World
sponsored by F5 Networks
RESOURCE:Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work.
Posted: 23 Apr 2020 | Published: 23 Apr 2020
Get This Now


THE IMITATION GAME: Detecting and Thwarting Automated Bot Attacks
sponsored by F5 Networks
RESOURCE:IT executives, contributors, and IT security teams in a range of industries understand that their growing arrays of public-facing applications, whether those are web, mobile, or API-based, are the targets of automated bot attack campaigns.
Posted: 23 Apr 2020 | Published: 23 Apr 2020
Get This Now


Successfully Managing VDI Services with the BIG-IP System
sponsored by F5 Networks
WHITE PAPER:Learn how you can unite all the components required to make a complete and secure VDI services delivery solution in one integrated and consolidated platform.
Posted: 15 Nov 2011 | Published: 15 Nov 2011
Get This Now


23 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences