Research Library

Powered by

All Research Sponsored By:Akamai Technologies

  • Deakin University Pivots Seamlessly to a 100% Digital Campus

    When Deakin University needed to quickly ensure uninterrupted access to course materials and other digital resources for users worldwide, longtime partner Akamai helped provide the right solution. Download this case study to learn more.

  • Countering Bots that Attack Your Site

    Tap into this article to learn about Akamai’s bot management solutions, such as Bot Manager, and how they offer behavioral-based detections with advanced machine learning to keep your websites secure.

  • Credential Stuffing Attacks Threaten Businesses in Asia-Pacific

    The downside of IT automation is its ability to be exploited by cyber criminals. Botnets are causing numerous credential stuffing attacks around the world, with as many as 85 billion of such attacks from Dec. 2017 to Nov. 2019. They cause many problems for business, but there are ways to find signs and prevent them. Read this article to learn more.

  • Phishing Factories Exploit Trust to Attack Businesses

    As if it wasn’t enough to worry about attacks from independent threat actors, there is now an emerging underground economy of phishing ‘factories’ using more sophisticated social engineering tactics to gain trust among victims. Is your organization prepared? Read this article to discover alarming trends about phishing and how to increase awareness.

  • Business Continuity: What Have We Learned So Far?

    Organizations have asked their employees to work remote, and they’ve done their best to scale digital transformation as a result. These changes have supported workforce productivity requirements, but they’ve also created an expanded attack surface and unforeseen complexity. Watch this webcast to learn how organizations can adapt to the new normal.

  • Keep Out Vulnerable Third-Party Scripts That Help Steal Data from Your Website

    Tap into this article to learn about Akamai’s intelligent edge platform that can detect malicious script activity, protect the integrity of webpages, and safeguard businesses.

  • Phishing Factories and Economies: The Real Persistent Threat

    A study conducted by Akamai indicates a recent uptick in Coronavirus-related phishing attacks. Pandemic aside – phishing threats continue to grow despite increasing investment into prevention methods. Watch this webinar to learn more about the evolving phishing landscape, emerging techniques, and more.

  • Third Party Script Application Security: Intrusion vs Detection

    Emerging tactics among credit card skimming attacks are underlying the need to fortify security to stay ahead of these increasingly devastating campaigns. This 20-minute video provides a brief history of Magecart attacks and the rise of third-party scripts. Watch now to learn more about these threats and better understand how to mitigate them.

  • Video: Understanding bots and their role in credential stuffing

    In this talk, Akamai security strategist Siddharth Deshpande will walk you through the dark web economy for malicious bots used in Credential Stuffing attacks and discuss options for effective Bot Management.

  • A Zero-Trust Environment Is Important To Business Continuity

    In this article, learn more on why you should take the time to reassess your business continuity plan and start thinking about moving towards a zero-trust environment.

  • Video: Latest Credential Stuffing Attack Campaigns in Asia Pacific

    Businesses struggle to deal with the challenge of bot and botnet attacks on their networks. Because security networks are less agile, IT departments scramble when an unknown IP is detected, and by this time, it’s usually too late. Watch this webcast to learn more about credential stuffing, a type of botnet attack that is used to gain user access.

  • Video: Decoding Magecart/Web Skimming Attacks

    Cyberthreat actors have taken note of the increased reliance on the internet due to COVID-19. More specifically, they are eyeing the sharp growth in online transactions. They are using web skimming, a hacking technique that injects malware onto a payment page to steal the payment information. Watch this webcast to learn more.

  • Credential Stuffing in the Media Industry

    This report features two years of insights into how criminals target and attack fast-growing industries, and supplements it with data that shows how they pivot and scale when circumstances change. Download it now.

  • Bot Management Vendors, 2020

    After evaluating 13 vendors on 10 criteria, The Forrester New Wave: Bot Management, Q1 2020 report names Akamai a Leader. The Akamai Intelligent Edge Platform provides unmatched visibility into the ever-changing bot landscape. Download this new report to review and select the right partner for your bot management needs.

  • Customer Identity and Access Management - Deciding Between Build vs Buy

    This webinar explores the pros and cons of in-house CIAM solutions versus commercial CIAM solutions - taking into account changing requirements dictated by resource, technology, innovation, customer experience, security compliance and regulations.

  • [ 2019 ] State of the Internet / Media Under Assault

    In this State of the Internet / Security report, take a look at the sources, techniques, and trends in this growing threat. You’ll see what 98% of web attacks against media and technology sectors have in common. And why video media attracts more credential stuffing attacks than any other vertical.

  • [ 2019 ] State of the Internet / Web Attacks & Gaming Abuse

    Criminals go where the money is. And these days, there’s real money to be stolen in the virtual world of gaming. Download Akamai’s latest State of the Internet / Security report that delves into the growing popularity of credential stuffing attacks against the gaming industry.

  • Business Continuity - What have we learned

    The rapid changes of remote work have unfortunately expanded the attack surface and unforeseen complexity. To adapt to this new normal, organizations must move beyond inherent and static digital trust to adaptive access and threat protection. View this webinar to learn how to get started.

  • Latest Credential Stuffing Attack Campaigns in Asia Pacific

    The wide availability of compromised credentials combined with new sophisticated automated attack techniques have made credential stuffing a risk to many businesses. In this webinar, learn about recent attack patterns and how to defend against them.

  • Phishing Factories and Economies - The Real Persistent Threat

    Sadly, criminals will always leverage current events. Akamai's expert Security Research team has noted dozens of new Coronavirus domains are being deployed each day and we expect this trend to continue. In this presentation, take a deep dive into zero-day phishing detection and how it helps to fight back and reduce the impact of these scams.

  • Customer Story: Priceline Provides Secure Remote Access to Business-Critical Resources and Reduces Access Control Costs

    After a successful proof of concept, Priceline, an online travel agency deployed Akamai Enterprise Application Access to secure their remote users’ access and simplify access management. See what their Principal Server Engineer has to say about their success with Akamai.

  • E-book: Competitive Edge in the Cloud

    Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren’t also introducing risks? This e-book explains how Akamai’s cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure.

  • The Forrester Wave™: Web Application Firewalls, Q1 2020

    With web apps and APIs becoming more complex and threats becoming more sophisticated, enterprises are demanding more from web application firewalls (WAFs). Forrester Research evaluated the 10 most significant WAF vendors based on current offering, strategy, and market presence, and named Akamai a WAF Leader.

  • State of the Internet / Security: Financial Services — Hostile Takeover Attempts

    Learn about spikes in credential stuffing attacks against APIs, LFI passing SQLi as a leading web attack vector, and a DDoS attack against one bank that reached an astounding 160 Gbps.

  • Case study: Leading Payments Platforms Leverages Akamai’s World-Class Security

    Learn how Akamai has been able to improve API performance and reduce traffic noise for CashFlows, a fast-growing, innovative provider of merchant payment solutions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.