Tools and Techniques used in Automated Threats

Logo
Presented by

Shain Singh, Cloud Security Lead, F5 and Benjamin Francis, Fraud Specialist, Shape Security F5

About this talk

The use of automation and bots for attacks have been around from the earliest days of OWASP and web application firewalls. What has changed over the years is the increased exposure to these threats with the increasing use of public clouds and explosion of applications. Malicious actors have also evolved into more sophisticated adversaries as there is a growing financial gain from successful breaches. Learn from our industry experts on the common tools used to bypass common mitigation techniques, as well as how the OWASP Automated Threat list can be implemented for a comprehensive defense strategy.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (78)
Subscribers (6299)
With 20+ years of application service experience, F5 provides the broadest set of services and security for enterprise-grade apps, whether on-premises or across any multi-cloud environment. F5 Networks APAC hosts a new webinar every month around cloud and security topics, so do stay tuned to this channel to get the latest information! Follow @F5NetworksAPJ on Twitter for more information.