ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Shape Security

  • Insurer Prevents Losses from Fake Quotes

    A top 10 insurance company noticed higher than anticipated traffic on its quote generation application and was concerned that the unexpected volume was caused by a surge of automated traffic creating fake insurance quotes. In this case study, learn why the insurance company choose to implement Shape's Enterprise Defense to stop these attacks.

  • Webinar: Latest Fraud Schemes in Retail and Hospitality

    Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.

  • How Tier One Bank can Innovate Alongside Financial Aggregators

    Aggregators innovate but also add credential-stuffing threat surface, ATO risk, and more. In this video, learn the techniques and strategies that Fortune 500 Banks use to partner with aggregators and better serve clients.

  • Automating Cybercrime with Sentry MBA

    Sentry MBA is an automated attack tool used by cybercriminals to take over user accounts on major websites. In this brief, gain a better understanding of how Sentry MBA works to help you defend against credential stuffing attacks.

  • Do You Need a WAF, or Something Better than a WAF?

    The security market is drifting away from the use of web application firewall (WAF) technology for a number of reasons. In this blog post, learn about Shape Security's new solution which is a distributed anti-automation service, fronted by machine learning and backed by specialist operators.

  • Retailer Solves Shoe-Bot Spikes, Fixes Fraud, Friction and Fake

    In this case study, find out how a North American retailer fought fraud and overcame a variety of cybersecurity challenges to provide a friction-free shopping experience.

  • Starbucks Combats Credential Stuffing and Account Takeover

    Starbucks' Director of InfoSec, Mike Hughes, joins the CEO of Shape Security for a conversation regarding the challenges of credential stuffing and account takeover at Starbucks and the industry at large. Tune in to hear about Starbuck's success with Shape Security's Blackfish.

  • Courier Prevents Shipping Fraud

    A top 5 global courier wanted to protect its customers from account takeover and prevent fraudulent account creation. In this case study, learn how the provider was able to do this by deploying Shape Enterprise Defense across its login and account creation applications on both the web and mobile devices.

  • Sophisticated Cyber Attacks and Trends in Online Fraud

    In this video, listen to Dan Woods, former FBI agent, discuss sophisticated cyberattacks and trends in online fraud.

  • Okta + Shape: Stopping Identity Attacks in their Tracks

    In this short video, learn how Okta and Shape Security partnered up to offer a comprehensive identity-first security strategy that aimed to prevent both automated and targeted identity attacks.

  • Top 10 North American Bank Eliminates Credential Stuffing

    A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. In this case study, learn how Shape's Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.

  • Airline Stops Automated Attacks on Web & Mobile

    A top 10 global airline was facing 2 major types of attacks including credential stuffing and fare scraping. When account lockouts peaked due to these attacks, the airline knew it needed to find a solution to stop credential stuffing attacks immediately. In this case study, learn why they decided to deploy Shape Enterprise Defense.

  • Top 3 Telecom Provider Secures Mobile Accounts

    A Top 3 US Telecom Provider needed to secure its mobile accounts from credential stuffing attackers targeting them to commit various fraud schemes. In this case study, learn how the company was able to stop upgrade theft, 2FA bypass, and virtual calling with Shape Enterprise Defense.

  • Live Threat Briefing New Attack Trends in Retail

    Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques.

  • Online Retail Threats Credential Stuffing

    In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.