Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Attack of the bots - How to fight back and win Benjamin Francis, Solutions Engineer, F5 Distributed Cloud Criminals have weaponized automation and other smart technologies to enable their pillage - and for the most part to great success by pretending to be... 2 months ago | 37 mins JavaScript Supply Chain Risks & How to Stop Them Judy Lazaro, Product Marketing Mgr, F5 | Kyle Roberts, Technical Marketing Engineer, F5 | Saurav Sharan, Sr. Product Mgr, F5 We've seen a recent proliferation of client-side attacks, thanks to an increase in malicious actors exploiting the vast attack surface created by toda... 8 months ago | 40 mins The Enterprise Strategy Group (ESG) Economic Value Analysis of HUMAN Nathan McAfee, Senior Economic Analyst, Enterprise Strategy Group and Peter Craig, Director of Product Marketing, HUMAN You know that protecting your organization from sophisticated bots, client-side threats, and account fraud has value. But quantifying the ROI is easie... 2 months ago | 50 mins Attack of the bots - How to fight back and win Benjamin Francis, Solutions Engineer, F5 Distributed Cloud Criminals have weaponized automation and other smart technologies to enable their pillage - and for the most part to great success by pretending to be... 3 months ago | 37 mins Magecart Attacks: The Client-Side Blindspot Ido Safruti, CTO and Co-Founder at PerimeterX and Deepak Patel, VP of Product Marketing at PerimeterX Modern retail and hospitality websites deliver a rich customer experience using client-side JavaScript, including scripts from third-party vendors and... 3 years ago | 44 mins The Client-side Blind Side: Supply Chain Risks in Website Code Avishai Shafir, Director of Product Management and Ameet Naik, Director of Cybersecurity Strategy at PerimeterX Your software supply chain is the new attack surface. Web applications are especially vulnerable as your code shifts to the client side where your leg... 2 years ago | 42 mins Enabling a secure connected infrastructure - CDS Lessons Learned Lisa Hawes, Sr. Product Manager & Autumn-Dawn Blanchette, Systems Engineering Manager, Forcepoint G2CI Find out DOD lessons learned from deploying CDS at scale. 2 years ago | 17 mins The Dark Side of 3rd Party Scripts Matt McGuirk What financial companies need to know & how to make sure you are protected. Attend this Talk and Discover: - What a real-time demo of a Formjacking a... 3 years ago | 37 mins Introduction to Pro-Active Intruder Hunting - Part 1 Bruce Roton, CISSP, CISA, CISM, CIPP/US, C|EH, C|CISO, CRISC, ISO-27001, CGEIT, CSSGB(IT), ITIL, CSMCP It is a common axiom of cyber security wisdom that it is not a question of if an organization’s defenses will be breached, but only a question of when... 3 years ago | 48 mins Magecart Attacks Require A New Approach to Web App Security Ido Safruti, CTO and Co-Founder at PerimeterX and Deepak Patel, VP of Product Marketing at PerimeterX Today’s modern web applications deliver a rich experience by using code from third-party vendors and open source libraries. Unfortunately, this code i... 4 years ago | 44 mins Load more