Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Next generation cloud security – A deeper dive into application and API security Dominic Lovell, Solutions Engineering Manager, ANZ | Sreejith Muraleedharan, Senior Solutions Engineer In our previous session, we discussed how Akamai’s App and API protector streamlines the protection of your web applications and API in a dynamic and ... 9 months ago | 42 mins easyJet’s Journey to Protect Their Booking Engine from Unwanted Traffic Sean O'Neill, Editor in Chief & Moderator Tnooz, Gene Quinn, Co-Founder & Producer Tnooz Did you know 30% of travel industry website visitors are unsavory competitors, hackers, spammers, and fraudsters? Worse yet, unwanted traffic from we... 6 years ago | 41 mins Rethinking Traffic Shaping in the Cloud Era Chris Siakos, Founder and CTO, at Sinefa & Alex Henthorn-Iwane, VP Product Marketing at Sinefa Traffic shaping is a powerful and useful capability for ensuring that network bandwidth is allocated based on business priorities and that unwanted ap... 3 years ago | 49 mins Traffic Shaping in the Cloud Era Chris Siakos, Founder and CTO, at Sinefa & Alex Henthorn-Iwane, VP Product Marketing at Sinefa Traffic shaping is a powerful and useful capability for ensuring that network bandwidth is allocated based on business priorities and that unwanted ap... 2 years ago | 56 mins Your Cloud Workloads Are Fully Secure, Right? Bassam Khan, VP of Product and Technical Marketing Engineering - Gigamon You have all the cloud monitoring and security tools in place. Would you agree that it’s still difficult to: - Have complete visibility and eliminat... 1 year ago | 26 mins The Rise of the Bad Bots - How to Defend Your Web Applications Stephen Gates, Chief Research Intelligence Analyst Today's hackers use bots to launch pre-attack scans, post comment spam, exploit vulnerabilities, and execute code injection attacks, denial of service... 6 years ago | 30 mins Threat Hunting Tool: Sweet Security Supercharged [Hunter Spotlight] Travis Smith, Principal Security Researcher at Tripwire In this episode of the Threat Hunting series we will feature a network security tool developed and used by real-life threat hunters. Sweet Security is... 6 years ago | 43 mins Account Takeovers | Is Your Retail Website Safe? Thomas Platt, Traffic Management and Web Security Expert Account takeover fraud isn’t going to stop and the tactics engaged by cyber criminals are becoming more sophisticated every day. The retail market is ... 5 years ago | 32 mins Eliminating Account Takeovers with Machine Learning and Behavioural Analysis Thomas Platt, Account Takeover Expert Attend this webinar to learn how Intechnica helps customers block account take over attacks by applying machine learning and behavioural analysis to a... 5 years ago | 47 mins Proactive Protection Against Web Application Attacks Sudarshan Sivaperumal - Solution Architect, F5 Networks. Web application attacks are the number one source of data breaches and the number and frequency of attacks are continuing to increase. A Web Applica... 4 years ago | 53 mins