Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Customer Loyalty: Protecting the Client-side Experience Susan McReynolds, Akamai | Christine Ross, Akamai | Emily Lyons, Akamai Attracting customers to your website is only half the battle; Keeping them there is what matters most. That’s why creating and maintaining a seamless ... 6 days ago | 35 mins Attack of the bots - How to fight back and win Benjamin Francis, Solutions Engineer, F5 Distributed Cloud Criminals have weaponized automation and other smart technologies to enable their pillage - and for the most part to great success by pretending to be... 5 days ago | 37 mins Attack of the bots - How to fight back and win Benjamin Francis, Solutions Engineer, F5 Distributed Cloud Criminals have weaponized automation and other smart technologies to enable their pillage - and for the most part to great success by pretending to be... April 12, 2023 5:00am Customer Loyalty: Protecting the Client-side Experience Susan McReynolds, Akamai | Christine Ross, Akamai | Emily Lyons, Akamai Attracting customers to your website is only half the battle; Keeping them there is what matters most. That’s why creating and maintaining a seamless ... 4 months ago | 35 mins Imperva Scene: セキュリティスペシャリストがお届けするミニデモセッション Vol.3 サプライチェーン攻撃対策 (Japanese) Hideaki Higashi, Sales Engineer, Imperva Japan Imperva Sceneは、Impervaが提供する新しいバーチャルシリーズで、企業組織が日々直面する重要なセキュリティ課題に対して、30分以内でタイムリーな回答やソリューションをお届けします。 第3回目となるこのウェビナーでは、サプライチェーン攻撃について取り上げます。コモディティマルウェアと... 1 month ago | 30 mins Ep 5 - Top 5 Pitfalls to Avoid in Client-Side Security Dor Zakai, Senior Director Solutions Engineering, F5 and Patrick Zoller, Security Solutions Architect, F5 As you secure your applications and protect them from security breaches and fraud events, you've likely turned to preventative and detective controls ... 4 months ago | 60 mins How to Fend off Inherent Vulnerabilities Attacks - What You Need to Know Dan Woods, Global Head of Intelligence, F5 There are a myriad of bad actors leveraging multiple attack vectors and vulnerabilities on an on-going basis. Detecting and preventing attacks against... 4 months ago | 59 mins JavaScript Supply Chain Risks & How to Stop Them Judy Lazaro, Product Marketing Mgr, F5 | Kyle Roberts, Technical Marketing Engineer, F5 | Saurav Sharan, Sr. Product Mgr, F5 We've seen a recent proliferation of client-side attacks, thanks to an increase in malicious actors exploiting the vast attack surface created by toda... 5 months ago | 40 mins Dissecting Client-Side Attack Techniques and Their Protections Tim Wong, Sr. Solutions Engineer, Akamai Technologies Hackers are leveraging client-side attack techniques, also known as man-in-the-browser (MITB) attacks, to intercept and control client browsers, exfil... 2 years ago | 35 mins Dissecting Client-Side Attack Techniques and Protections Tim Wong, Senior Solutions Engineer, Akamai Technologies Hackers are leveraging client-side attack techniques, also known as man-in-the-browser (MITB) attacks, to intercept and control client browsers, exfil... 2 years ago | 59 mins Load more