ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Akamai Technologies

  • The Future of Network Security Is in the Cloud

    Users, devices, applications, and data are now located outside of the enterprise. It's time to rethink your network security delivery model. Download this Gartner report to learn why your organization could benefit from a converged cloud-delivered secure access service edge (SASE).

  • Product Video: Enterprise Threat Protector

    Many businesses plan to move security to the cloud as legacy systems cannot keep up with modern threats and traffic volume. As a result, they will need threat protection and detection that is proven, accurate and adaptable, even against zero-day threats – and latency must be zero. View this brief video to learn about Enterprise Threat Protector.

  • Product Video: Web Application Protector

    Ensuring the security of web applications is becoming increasingly difficult as the usage of these apps continues to expand. Watch this brief video for a closer look at Akamai’s Web Application Protector, designed to provide automated, scalable protection for your web apps against today’s sophisticated threats.

  • Product Video: Enterprise Application Access

    With remote work at an all-time high, it’s critical that only the correct users get access to the right applications at the right time. Now, this can be done without granting a user full access to a network. How? By integrating tools such as MFA, SSO and identity onto one secure access platform. Watch this video to get a closer look.

  • Product Video: Page Integrity Manager

    Did you know that third-party scripts running on your website can make up more than half the code in your digital ecosystem? Those scripts are often outside your control, leaving you vulnerable at the browser-level. Watch this product demo and learn about a powerful, easy to implement, behavior-based approach to script attacks.

  • DDoS Attacks are Growing in Frequency and Scale During the Pandemic. What Can Businesses Do?

    Remote work means DDoS attacks loom larger than ever. On June 25, 2020, a European bank was hit with an attack that generated 809 million packets per second. The velocity and volume of these attacks can be overwhelming, but the right strategy can keep your network safe. Read this article to learn 6 considerations for mitigating DDoS attacks.

  • Product Video: Kona Site Defender

    New applications and APIs are constantly being introduced, and existing ones are changing. Therefore, protection must be flexible and scalable so that it’s less challenging to pivot. You may be able to benefit with fully customizable protection that uses automation to inspect traffic and defend API endpoints. Watch this video for more details.

  • Deakin University Pivots Seamlessly to a 100% Digital Campus

    When Deakin University needed to quickly ensure uninterrupted access to course materials and other digital resources for users worldwide, longtime partner Akamai helped provide the right solution. Download this case study to learn more.

  • Countering Bots that Attack Your Site

    Tap into this article to learn about Akamai’s bot management solutions, such as Bot Manager, and how they offer behavioral-based detections with advanced machine learning to keep your websites secure.

  • Credential Stuffing Attacks Threaten Businesses in Asia-Pacific

    The downside of IT automation is its ability to be exploited by cyber criminals. Botnets are causing numerous credential stuffing attacks around the world, with as many as 85 billion of such attacks from Dec. 2017 to Nov. 2019. They cause many problems for business, but there are ways to find signs and prevent them. Read this article to learn more.

  • Phishing Factories Exploit Trust to Attack Businesses

    As if it wasn’t enough to worry about attacks from independent threat actors, there is now an emerging underground economy of phishing ‘factories’ using more sophisticated social engineering tactics to gain trust among victims. Is your organization prepared? Read this article to discover alarming trends about phishing and how to increase awareness.

  • Business Continuity: What Have We Learned So Far?

    Organizations have asked their employees to work remote, and they’ve done their best to scale digital transformation as a result. These changes have supported workforce productivity requirements, but they’ve also created an expanded attack surface and unforeseen complexity. Watch this webcast to learn how organizations can adapt to the new normal.

  • Keep Out Vulnerable Third-Party Scripts That Help Steal Data from Your Website

    Tap into this article to learn about Akamai’s intelligent edge platform that can detect malicious script activity, protect the integrity of webpages, and safeguard businesses.

  • Phishing Factories and Economies: The Real Persistent Threat

    A study conducted by Akamai indicates a recent uptick in Coronavirus-related phishing attacks. Pandemic aside – phishing threats continue to grow despite increasing investment into prevention methods. Watch this webinar to learn more about the evolving phishing landscape, emerging techniques, and more.

  • Third Party Script Application Security: Intrusion vs Detection

    Emerging tactics among credit card skimming attacks are underlying the need to fortify security to stay ahead of these increasingly devastating campaigns. This 20-minute video provides a brief history of Magecart attacks and the rise of third-party scripts. Watch now to learn more about these threats and better understand how to mitigate them.

  • Video: Understanding bots and their role in credential stuffing

    In this talk, Akamai security strategist Siddharth Deshpande will walk you through the dark web economy for malicious bots used in Credential Stuffing attacks and discuss options for effective Bot Management.

  • A Zero-Trust Environment Is Important To Business Continuity

    In this article, learn more on why you should take the time to reassess your business continuity plan and start thinking about moving towards a zero-trust environment.

  • Video: Latest Credential Stuffing Attack Campaigns in Asia Pacific

    Businesses struggle to deal with the challenge of bot and botnet attacks on their networks. Because security networks are less agile, IT departments scramble when an unknown IP is detected, and by this time, it’s usually too late. Watch this webcast to learn more about credential stuffing, a type of botnet attack that is used to gain user access.

  • Video: Decoding Magecart/Web Skimming Attacks

    Cyberthreat actors have taken note of the increased reliance on the internet due to COVID-19. More specifically, they are eyeing the sharp growth in online transactions. They are using web skimming, a hacking technique that injects malware onto a payment page to steal the payment information. Watch this webcast to learn more.

  • Credential Stuffing in the Media Industry

    This report features two years of insights into how criminals target and attack fast-growing industries, and supplements it with data that shows how they pivot and scale when circumstances change. Download it now.

  • Customer Identity and Access Management - Deciding Between Build vs Buy

    This webinar explores the pros and cons of in-house CIAM solutions versus commercial CIAM solutions - taking into account changing requirements dictated by resource, technology, innovation, customer experience, security compliance and regulations.

  • [ 2019 ] State of the Internet / Media Under Assault

    In this State of the Internet / Security report, take a look at the sources, techniques, and trends in this growing threat. You’ll see what 98% of web attacks against media and technology sectors have in common. And why video media attracts more credential stuffing attacks than any other vertical.

  • [ 2019 ] State of the Internet / Web Attacks & Gaming Abuse

    Criminals go where the money is. And these days, there’s real money to be stolen in the virtual world of gaming. Download Akamai’s latest State of the Internet / Security report that delves into the growing popularity of credential stuffing attacks against the gaming industry.

  • Business Continuity - What have we learned

    The rapid changes of remote work have unfortunately expanded the attack surface and unforeseen complexity. To adapt to this new normal, organizations must move beyond inherent and static digital trust to adaptive access and threat protection. View this webinar to learn how to get started.

  • Latest Credential Stuffing Attack Campaigns in Asia Pacific

    The wide availability of compromised credentials combined with new sophisticated automated attack techniques have made credential stuffing a risk to many businesses. In this webinar, learn about recent attack patterns and how to defend against them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.