Adoption of data-driven security is set to rise threefold in 2016. Benefits include advanced security automation, accuracy and intelligence that enable mitigation capabilities to adapt in real time as threats change. However, solutions will only be as effective as the age, quality and quantity of the data available, meaning access to vast amounts of live attack traffic will be vital. Join us for this webinar to learn more about data-driven security and how it’s being deployed to bolster web defences.
Mike Kun, Manager, Akamai Customer Security Incident Response Team
DD4BC has targeted many businesses, threatening an attack and demanding Bitcoin payments. Learn about their tactics and techniques, and why Akamai believes that other copycat groups are on the horizon.
It’s no secret that there are botnets for hire, groups of computers that can, and are, used against our organizations on a daily basis. But what is the nature of these botnets? What abilities do each of the installed toolkits offer to the attacker? Most importantly how do their capabilities change the defenses necessary to protect yourself?
We’ll cover two of the most recent toolkits that have been seeing wide usage. Learn a little about the people behind the attacks, where the attacks are coming from and what you might expect to see in the near future. You might be a bit surprised at where a lot of the traffic is coming from (hint: it’s closer than you think).
Martin McKeay, Senior Security Advocate, Akamai in Europe
Criminals are increasingly turning to cyber-crime as their method of choice, thanks to the increased accessibility provided by numerous automated attack tools and ‘for hire’ subscription services. The number of Distributed Denial of Service (DDoS) attacks against organisation’s websites, for example, are increasing rapidly and the true business costs are often unknown. In addition to the more obvious impacts associated with the lost web transactions associated with downtime, there are also reputational and other ephemeral costs that are harder to quantify.
We’ll be examining both the monetary and reputational costs of an attack on your infrastructure, as well some of the measures you can take to combat these attacks. With data drawn from Akamai’s State of the Internet Report, we’ll be talking about real world examples of attacks and how these could affect your business.
Martin McKeay, Security Advocate, Akamai Technologies
They say old protocols never die. Okay, no one really says that, but it’s what happens in reality. If you look around a little, you can still find organisations with token ring networks while dial-up modems still account for a small, but significant part of Internet usage worldwide. And then there are the current protocols that simply never get updated. DNS and NTP are staples of the Internet that are absolutely necessary.
Martin McKeay, Akamai’s Security Advocate for EMEA, will explore the dangers of some of the outdated and unpatched protocols on the Internet today. These antiquated communication methods are being used and abused by malicious actors to send traffic and attacks against your network. Explore how to protect yourself, and learn good network hygiene practices to make sure your organisation is not part of the problem.
As the global leader in Content Delivery Network (CDN) services, Akamai makes the Internet fast, reliable and secure for its customers. The company's advanced web performance, mobile performance, cloud security and media delivery solutions are revolutionising how businesses optimise consumer, enterprise and entertainment experiences for any device, anywhere.
HTTP/2 Uncovered: Top Tips for Successful ImplementationMichael Gooding, Web Performance Evangelist, Akamai; Richard Still, Technical Architect, Financial Times[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]51 mins
Learn more about BrightTALK's products and services.