Hi [[ session.user.profile.firstName ]]

Akamai

  • Date
  • Rating
  • Views
  • Equifax Breach Lessons: How to Stop the Next Breach — or Slow It Down
    Equifax Breach Lessons: How to Stop the Next Breach — or Slow It Down
    Josh Shaul, VP Web Security, Akamai, Rick Holland, VP Strategy, Digital Shadows, Chris Sullivan, CISO, Core Security Recorded: Sep 29 2017 61 mins
    What are the lessons learned from the recent rash of mega-breaches (Equifax, CIA, NSA)? How can you apply these lessons toward educating your workforce and strengthening your organization’s security posture?

    Listen to this panel of cyber security experts to learn more about:
    - Why the Equifax data breach was inevitable
    - How to prepare against the next big one
    - How to detect breaches faster
    - The first 24 hours after a breach
    - The importance of employee security training
    - What CISOs can learn from this breach

    Speakers:
    Josh Shaul, VP of Web Security Product Management, Akamai
    Rick Holland, VP Strategy, Digital Shadows
    Chris Sullivan, SVP, Chief Information Security Office, Core Security

    Moderated by
    William Leichter, VP Marketing, Virsec Systems
  • Learn how AO.com increased conversion rates on mobile devices
    Learn how AO.com increased conversion rates on mobile devices
    Adam Warne, Global IT director, AO.com, Jason Miller, Chief Strategist of Commerce, Akamai Recorded: Sep 19 2017 60 mins
    Online shoppers are browsing and buying more frequently than ever before, and they are doing so from multiple networks, locations, and mobile devices.

    In this webinar, in partnership with AO.com and Internet Retailing, we will examine the best ways for retailers to optimise and monitor their websites’ customer experience.

    Akamai’s Chief Strategist of Commerce, Jason Miller, will be joined by Adam Warne, Global IT Director at AO.com, who will be able to share how they have increased conversion rates on mobile devices.

    In this webinar, you’ll learn how AO.com:

    Optimises for mobile devices
    Managed to scale their e-commerce platform during peak periods, including when they became the main sponsor for the TV show "Britain’s Got Talent"
    You’ll also learn how to:

    Properly deliver the correct size of images to various device types
    Prepare for peak traffic and scalability
    Manage non-human traffic in a way that optimises performance for real customers
  • Cybersecurity and the New Definition of "Adequate"
    Cybersecurity and the New Definition of "Adequate"
    Rich Bolstridge, Chief Strategist, Financial Services, Akamai Technologies Recorded: Jun 28 2017 45 mins
    The threat landscape for financial institutions has changed considerably since the DDoS attacks of 2012, with credential abuse, account takeover, and fraudulent money movement causing a host of security issues.

    As a result, asset managers of all sizes need to invest in more controls to reduce this risk. Join this webinar with Rich Bolstridge, Chief Strategist, Financial Services at Akamai Technologies, for an overview of how the definition of “adequate cybersecurity” has shifted.

    Key topics will include:
    •The evolution of the financial threat landscape
    •What "adequate" security is today
    •The unique security challenges facing asset managers
  • State of the Internet Security Report: Q1 2017 Findings
    State of the Internet Security Report: Q1 2017 Findings
    Daniel Shugrue Director of Product Marketing, Akamai, Miguel Serrano Director of Product Marketing, Akamai Recorded: May 17 2017 60 mins
    Akamai sees more than two trillion Internet interactions every day and has mitigated malicious attack traffic over 630 Gbps. Our security experts analyze this information and share trends, observations, and findings in the quarterly State of the Internet / Security Report .

    Join us for an overview of Distributed Denial of Service (DDoS) and web application trends and data gathered from Q1 2017.

    Key topics will include:

    The continued threat of DDoS attacks leveraging IoT devices

    Source and target regional data for web application and DDoS attacks

    Significant increases in reflection DDoS attack traffic

    Spotlight on financial services organizations targeted by new features within the Mirai botnet
  • Simple, Secure Third-Party Application Access
    Simple, Secure Third-Party Application Access
    Jim Black, Senior Product Marketing Manager, Enterprise, Akamai, Tom Adamski, Enterprise Solutions Engineer, EMEA, Akamai Recorded: Mar 16 2017 32 mins
    Providing employees with secure access to enterprise applications deployed behind the firewall is a core requirement for all businesses. Increasingly, enterprises must also deal with the riskier proposition of providing this same access to third parties, including their contractors, partners, suppliers, and customers. Enabling secure application access, whether hosted in a public cloud or private data center, is a complex and cumbersome task.

    Join this webinar to hear about:

    - Survey results revealing how your peers approach third-party access management
    - How to remove complexity around the management of third-party access
    - Challenges associated with moving a traditional network perimeter to the cloud
    - How third-party access exposes the enterprise to risk
    - Akamai’s innovative new cloud-service, which provides secure access to enterprise applications that live behind the firewall
  • Availability 101: How to Defend against Cyber Attacks
    Availability 101: How to Defend against Cyber Attacks
    Jay Coley, Sr. Director Security Strategy and Planning EMEA, Akamai Technologies Recorded: Mar 14 2017 31 mins
    With DDoS cyber attacks rapidly increasing in both size and speed, as well as attacks that are crafted for a specific application or service, it’s never been so critical to ensure your basic availability is sound. Mitigation services can no longer be ‘one size fits all’. Organisations now need a tailored platform for the specific application or service to ensure 100% availability. Without availability ensured then other security overlays are meaningless.

    This webinar will look at attack trends and case studies and provide top tips on how to stay ‘always on’ in the face of cyber attacks.
  • State of the Internet Security Report: Q4 2016 Findings
    State of the Internet Security Report: Q4 2016 Findings
    Daniel Shugrue, Director of Product Marketing, Akamai, Miguel Serrano, Director of Product Marketing, Akamai Recorded: Feb 16 2017 61 mins
    Akamai sees more than two trillion Internet interactions every day and has mitigated malicious attack traffic over 600 Gbps. Our security experts analyze this information to share trends, observations, and findings in the quarterly State of the Internet / Security Report .

    Join us for an overview of distributed denial of service (DDoS) and web application trends based on data gathered from Q4 2016.

    Key topics will include:

    The continued rise of IoT botnet including Mirai
    Source and target countries for web application and DDoS attacks
    Perimeter firewall DDoS reflector activity based on observed attacks
    Spotlight on Black Friday web application attacks against retailers
  • State of the Internet Security Report: Q3 2016 Findings
    State of the Internet Security Report: Q3 2016 Findings
    Miguel Serrano, Director of Product Marketing, Akamai Recorded: Nov 16 2016 60 mins
    Akamai sees more than 2 trillion Internet interactions every day and mitigates 40 – 50 DDoS attacks every month. Our security experts analyze this information and share trends, observations, and findings in the quarterly State of the Internet Security report.

    Join this for an overview of what we found after analyzing data from Q3 of 2016.

    Key topics covered will include:

    Why DDoS of over 100 Mbps increased over the past quarter
    Which country is the new leader for most sourced Web application attacks
    Tactics Akamai used to mitigate two of the largest DDoS attacks we’ve seen
    Web application attack metrics around the Summer Olympics and the UEFA Euro Championship Game
  • Holiday Retail Readiness with Akamai
    Holiday Retail Readiness with Akamai
    Jason Miller Chief Strategist of Commerce Akamai Technologies, Ari Weil Senior Director, Industry Marketing Akamai Technologi Recorded: Sep 22 2016 58 mins
    Your consumers are more engaged on mobile devices than ever before. Mobile commerce is up more than 50% globally and retail revenues are 60% greater than this time last year. Online retailers must be more prepared than ever to support a daunting number of connected devices operating on a variety of browsers and networks.

    Security must go hand-in-hand with performance this holiday season - retail leads the way as the industry most frequently targeted by attackers. In Q4 2015 nearly 60% of all cyber-attacks in North America targeted retail companies, and DDoS attacks were up 129%.

    With projections suggesting that this holiday season will break last year’s records, maintaining a high-quality user experience will be more challenging and more rewarding than ever before.

    Join Akamai's eCommerce experts to learn how best to position your business for success this holiday season.
  • State of the Internet Security Report: Q2 2016 Findings
    State of the Internet Security Report: Q2 2016 Findings
    Daniel Shugrue, Director of Security Product Marketing, Akamai, Miguel Serrano Director of Product Marketing Akamai Recorded: Sep 7 2016 60 mins
    Akamai’s threat intelligence is unique because of the depth and breadth of Internet traffic we see on a daily basis. We carry traffic from the 30 largest media organisations, 100 of the world’s largest banks, and 96 of the top 100 online US retailers. This provides visibility into the disposition of both legitimate and malicious traffic around the globe and across industries. We analyse this information and share trends, observations, and findings in the State of the Internet Security report.

    Join this webinar for an overview of the most important takeaways from our soon-to be released report.

    How and why application attacks have shifted by industry, moving away from hotel/travel and towards high tech
    Which country wins the gold medal for most sourced attacks
    An in-depth analysis of anonymisation: the use of proxies and VPN by threat actors
    A breakdown and description of the top bot types
    The nature, size, and tactics Akamai employed to mitigate the largest DDoS attack seen to date

Embed in website or blog