All resources sponsored by:

Akamai Technologies

1 - 25 of 30 Matches
State of the Internet / Security: Loyalty for Sale – Retail and Hospitality Fraud
sponsored by Akamai Technologies
ANALYST REPORT:The numbers speak for themselves: Retail, travel and hospitality all attracted a startling 63% of credential stuffing attacks and 41% of web attacks. In this new State of the Internet/Security report, Akamai goes beyond this data, taking you into the criminal marketplace that makes these industries and their loyalty programs such popular targets.
Posted: 04 Nov 2020 | Published: 30 Oct 2020
Get This Now


Akamai Prolexic
sponsored by Akamai Technologies
VIDEO:Distributed denial-of-service (DDoS) attacks can vary in size and scope; each with the potential to knock your website offline and send business grinding to a halt. Fortunately, Akamai’s Prolexic pairs automated, proactive DDoS mitigation tools with unmatched visibility and skilled response teams. Watch Prolexic in action in this product demo.
Posted: 04 Nov 2020 | Premiered: 04 Nov 2020
Get This Now


Akamai Kona Site Defender
sponsored by Akamai Technologies
VIDEO:Akamai's Kona Site Defender protects your applications and APIs against the most sophisticated DDoS and web application attacks. Harnessing the insights collected across the Akamai Intelligent Edge Platform, Kona Site Defender delivers highly accurate and predictive protection.
Posted: 03 Nov 2020 | Premiered: 03 Nov 2020
Get This Now


DDoS Extortion Battle Checklist
sponsored by Akamai Technologies
RESOURCE:Akamai has recently observed and mitigated an unprecedented number of extortion-driven DDoS attacks across numerous verticals, including manufacturing, gaming and financial services. Are you prepared to respond if you’re targeted? In this checklist, learn key attack responses and how best to work with a DDoS mitigation service provider.
Posted: 03 Nov 2020 | Published: 30 Oct 2020
Get This Now


Making a DDoS Protection Plan: 8 Best Practices
sponsored by Akamai Technologies
RESOURCE:DDoS attackers launch hundreds of DDoS attacks every day. And when a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, whom to call or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared are your best defense against DDoS attacks.
Posted: 03 Nov 2020 | Published: 03 Nov 2020
Get This Now


Analyst Report: Web Application Firewalls
sponsored by Akamai Technologies
ANALYST REPORT:Web applications firewalls (WAFs) are fundamental in application security, but as customer requirements are changing, WAF vendors are being asked for more. Broader attack defense, integration with security infrastructure and detection and response are among these requirements. Read this Forrester Wave report to see how 10 WAF leaders stack up.
Posted: 13 Oct 2020 | Published: 06 Mar 2020
Get This Now


Akamai Moves into Web Browser Security with Page Integrity Manager
sponsored by Akamai Technologies
WHITE PAPER:Malicious script activity has emerged as a new way for cybercriminals to conduct credit card skimming and other types of attacks. This 451 Research report provides a comprehensive overview of the Akamai Page Identity Manager, designed to combat this growing threat.
Posted: 12 Oct 2020 | Published: 22 May 2020
Get This Now


Product Video: Enterprise Threat Protector
sponsored by Akamai Technologies
VIDEO:Many businesses plan to move security to the cloud as legacy systems cannot keep up with modern threats and traffic volume. As a result, they will need threat protection and detection that is proven, accurate and adaptable, even against zero-day threats – and latency must be zero. View this brief video to learn about Enterprise Threat Protector.
Posted: 18 Aug 2020 | Premiered: 18 Aug 2020
Get This Now


Product Video: Web Application Protector
sponsored by Akamai Technologies
VIDEO:Ensuring the security of web applications is becoming increasingly difficult as the usage of these apps continues to expand. Watch this brief video for a closer look at Akamai’s Web Application Protector, designed to provide automated, scalable protection for your web apps against today’s sophisticated threats.
Posted: 18 Aug 2020 | Premiered: 18 Aug 2020
Get This Now


Product Video: Enterprise Application Access
sponsored by Akamai Technologies
VIDEO:With remote work at an all-time high, it’s critical that only the correct users get access to the right applications at the right time. Now, this can be done without granting a user full access to a network. How? By integrating tools such as MFA, SSO and identity onto one secure access platform. Watch this video to get a closer look.
Posted: 18 Aug 2020 | Premiered: 18 Aug 2020
Get This Now


Product Video: Page Integrity Manager
sponsored by Akamai Technologies
VIDEO:Did you know that third-party scripts running on your website can make up more than half the code in your digital ecosystem? Those scripts are often outside your control, leaving you vulnerable at the browser-level. Watch this product demo and learn about a powerful, easy to implement, behavior-based approach to script attacks.
Posted: 13 Aug 2020 | Premiered: 13 Aug 2020
Get This Now


DDoS Attacks are Growing in Frequency and Scale During the Pandemic. What Can Businesses Do?
sponsored by Akamai Technologies
RESOURCE:Remote work means DDoS attacks loom larger than ever. On June 25, 2020, a European bank was hit with an attack that generated 809 million packets per second. The velocity and volume of these attacks can be overwhelming, but the right strategy can keep your network safe. Read this article to learn 6 considerations for mitigating DDoS attacks.
Posted: 13 Aug 2020 | Published: 13 Aug 2020
Get This Now


Product Video: Kona Site Defender
sponsored by Akamai Technologies
VIDEO:New applications and APIs are constantly being introduced, and existing ones are changing. Therefore, protection must be flexible and scalable so that it’s less challenging to pivot. You may be able to benefit with fully customizable protection that uses automation to inspect traffic and defend API endpoints. Watch this video for more details.
Posted: 13 Aug 2020 | Premiered: 13 Aug 2020
Get This Now


Countering Bots that Attack Your Site
sponsored by Akamai Technologies
RESOURCE:Tap into this article to learn about Akamai’s bot management solutions, such as Bot Manager, and how they offer behavioral-based detections with advanced machine learning to keep your websites secure.
Posted: 05 Aug 2020 | Published: 05 Aug 2020
Get This Now


Credential Stuffing Attacks Threaten Businesses in Asia-Pacific
sponsored by Akamai Technologies
RESOURCE:The downside of IT automation is its ability to be exploited by cyber criminals. Botnets are causing numerous credential stuffing attacks around the world, with as many as 85 billion of such attacks from Dec. 2017 to Nov. 2019. They cause many problems for business, but there are ways to find signs and prevent them. Read this article to learn more.
Posted: 05 Aug 2020 | Published: 05 Aug 2020
Get This Now


Phishing Factories Exploit Trust to Attack Businesses
sponsored by Akamai Technologies
RESOURCE:As if it wasn’t enough to worry about attacks from independent threat actors, there is now an emerging underground economy of phishing ‘factories’ using more sophisticated social engineering tactics to gain trust among victims. Is your organization prepared? Read this article to discover alarming trends about phishing and how to increase awareness.
Posted: 04 Aug 2020 | Published: 04 Aug 2020
Get This Now


Business Continuity: What Have We Learned So Far?
sponsored by Akamai Technologies
WEBCAST:Organizations have asked their employees to work remote, and they’ve done their best to scale digital transformation as a result. These changes have supported workforce productivity requirements, but they’ve also created an expanded attack surface and unforeseen complexity. Watch this webcast to learn how organizations can adapt to the new normal.
Posted: 04 Aug 2020 | Premiered: Aug 4, 2020
Get This Now


Keep Out Vulnerable Third-Party Scripts That Help Steal Data from Your Website
sponsored by Akamai Technologies
RESOURCE:Tap into this article to learn about Akamai’s intelligent edge platform that can detect malicious script activity, protect the integrity of webpages, and safeguard businesses.
Posted: 03 Aug 2020 | Published: 03 Aug 2020
Get This Now


Phishing Factories and Economies: The Real Persistent Threat
sponsored by Akamai Technologies
VIDEO:A study conducted by Akamai indicates a recent uptick in Coronavirus-related phishing attacks. Pandemic aside – phishing threats continue to grow despite increasing investment into prevention methods. Watch this webinar to learn more about the evolving phishing landscape, emerging techniques, and more.
Posted: 03 Aug 2020 | Premiered: 03 Aug 2020
Get This Now


Third Party Script Application Security: Intrusion vs Detection
sponsored by Akamai Technologies
VIDEO:Emerging tactics among credit card skimming attacks are underlying the need to fortify security to stay ahead of these increasingly devastating campaigns. This 20-minute video provides a brief history of Magecart attacks and the rise of third-party scripts. Watch now to learn more about these threats and better understand how to mitigate them.
Posted: 31 Jul 2020 | Premiered: 31 Jul 2020
Get This Now


Video: Understanding bots and their role in credential stuffing
sponsored by Akamai Technologies
RESOURCE:In this talk, Akamai security strategist Siddharth Deshpande will walk you through the dark web economy for malicious bots used in Credential Stuffing attacks and discuss options for effective Bot Management.
Posted: 31 Jul 2020 | Published: 31 Jul 2020
Get This Now


A Zero-Trust Environment Is Important To Business Continuity
sponsored by Akamai Technologies
RESOURCE:In this article, learn more on why you should take the time to reassess your business continuity plan and start thinking about moving towards a zero-trust environment.
Posted: 30 Jul 2020 | Published: 30 Jul 2020
Get This Now


Video: Latest Credential Stuffing Attack Campaigns in Asia Pacific
sponsored by Akamai Technologies
WEBCAST:Businesses struggle to deal with the challenge of bot and botnet attacks on their networks. Because security networks are less agile, IT departments scramble when an unknown IP is detected, and by this time, it’s usually too late. Watch this webcast to learn more about credential stuffing, a type of botnet attack that is used to gain user access.
Posted: 30 Jul 2020 | Premiered: Jul 30, 2020
Get This Now


Video: Decoding Magecart/Web Skimming Attacks
sponsored by Akamai Technologies
WEBCAST:Cyberthreat actors have taken note of the increased reliance on the internet due to COVID-19. More specifically, they are eyeing the sharp growth in online transactions. They are using web skimming, a hacking technique that injects malware onto a payment page to steal the payment information. Watch this webcast to learn more.
Posted: 29 Jul 2020 | Premiered: Jul 29, 2020
Get This Now


From the Core to the Edge: 7 Reasons You Need Security at the Edge
sponsored by Akamai Technologies
WHITE PAPER:In this white paper, take a look at a security-at-the-edge approach and 7 reasons why it could help green light your digital business transformation.
Posted: 10 Jul 2019 | Published: 10 Jul 2019
Get This Now


1 - 25 of 30 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info