All resources sponsored by:

Shape Security

15 Matches
Insurer Prevents Losses from Fake Quotes
sponsored by Shape Security
CASE STUDY:A top 10 insurance company noticed higher than anticipated traffic on its quote generation application and was concerned that the unexpected volume was caused by a surge of automated traffic creating fake insurance quotes. In this case study, learn why the insurance company choose to implement Shape's Enterprise Defense to stop these attacks.
Posted: 30 Aug 2019 | Published: 30 Aug 2019
Get This Now


Webinar: Latest Fraud Schemes in Retail and Hospitality
sponsored by Shape Security
WEBCAST:Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.
Posted: 29 Aug 2019 | Premiered: Jul 31, 2019
Get This Now


How Tier One Bank can Innovate Alongside Financial Aggregators
sponsored by Shape Security
VIDEO:Aggregators innovate but also add credential-stuffing threat surface, ATO risk, and more. In this video, learn the techniques and strategies that Fortune 500 Banks use to partner with aggregators and better serve clients.
Posted: 28 Aug 2019 | Premiered: 28 Aug 2019
Get This Now


Automating Cybercrime with Sentry MBA
sponsored by Shape Security
RESOURCE:Sentry MBA is an automated attack tool used by cybercriminals to take over user accounts on major websites. In this brief, gain a better understanding of how Sentry MBA works to help you defend against credential stuffing attacks.
Posted: 28 Aug 2019 | Published: 28 Aug 2019
Get This Now


Do You Need a WAF, or Something Better than a WAF?
sponsored by Shape Security
RESOURCE:The security market is drifting away from the use of web application firewall (WAF) technology for a number of reasons. In this blog post, learn about Shape Security's new solution which is a distributed anti-automation service, fronted by machine learning and backed by specialist operators.
Posted: 27 Aug 2019 | Published: 01 May 2019
Get This Now


Retailer Solves Shoe-Bot Spikes, Fixes Fraud, Friction and Fake
sponsored by Shape Security
CASE STUDY:In this case study, find out how a North American retailer fought fraud and overcame a variety of cybersecurity challenges to provide a friction-free shopping experience.
Posted: 27 Aug 2019 | Published: 27 Aug 2019
Get This Now


Starbucks Combats Credential Stuffing and Account Takeover
sponsored by Shape Security
VIDEO:Starbucks' Director of InfoSec, Mike Hughes, joins the CEO of Shape Security for a conversation regarding the challenges of credential stuffing and account takeover at Starbucks and the industry at large. Tune in to hear about Starbuck's success with Shape Security's Blackfish.
Posted: 27 Aug 2019 | Premiered: 27 Aug 2019
Get This Now


Courier Prevents Shipping Fraud
sponsored by Shape Security
CASE STUDY:A top 5 global courier wanted to protect its customers from account takeover and prevent fraudulent account creation. In this case study, learn how the provider was able to do this by deploying Shape Enterprise Defense across its login and account creation applications on both the web and mobile devices.
Posted: 26 Aug 2019 | Published: 26 Aug 2019
Get This Now


Sophisticated Cyber Attacks and Trends in Online Fraud
sponsored by Shape Security
VIDEO:In this video, listen to Dan Woods, former FBI agent, discuss sophisticated cyberattacks and trends in online fraud.
Posted: 26 Aug 2019 | Premiered: 26 Aug 2019
Get This Now


Okta + Shape: Stopping Identity Attacks in their Tracks
sponsored by Shape Security
VIDEO:In this short video, learn how Okta and Shape Security partnered up to offer a comprehensive identity-first security strategy that aimed to prevent both automated and targeted identity attacks.
Posted: 26 Aug 2019 | Premiered: 26 Aug 2019
Get This Now


Top 10 North American Bank Eliminates Credential Stuffing
sponsored by Shape Security
CASE STUDY:A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. In this case study, learn how Shape's Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.
Posted: 20 Aug 2019 | Published: 20 Aug 2019
Get This Now


Airline Stops Automated Attacks on Web & Mobile
sponsored by Shape Security
CASE STUDY:A top 10 global airline was facing 2 major types of attacks including credential stuffing and fare scraping. When account lockouts peaked due to these attacks, the airline knew it needed to find a solution to stop credential stuffing attacks immediately. In this case study, learn why they decided to deploy Shape Enterprise Defense.
Posted: 20 Aug 2019 | Published: 20 Aug 2019
Get This Now


Top 3 Telecom Provider Secures Mobile Accounts
sponsored by Shape Security
CASE STUDY:A Top 3 US Telecom Provider needed to secure its mobile accounts from credential stuffing attackers targeting them to commit various fraud schemes. In this case study, learn how the company was able to stop upgrade theft, 2FA bypass, and virtual calling with Shape Enterprise Defense.
Posted: 19 Aug 2019 | Published: 19 Aug 2019
Get This Now


Live Threat Briefing New Attack Trends in Retail
sponsored by Shape Security
WEBCAST:Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques.
Posted: 19 Aug 2019 | Premiered: Aug 19, 2019
Get This Now


Online Retail Threats Credential Stuffing
sponsored by Shape Security
WHITE PAPER:In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Posted: 16 Aug 2019 | Published: 16 Aug 2019
Get This Now


15 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement