Displaying items by tag: bot attacks

GUEST OPINION: It's May 2020 and a large electronic goods retailer realises its bot problem is going from bad to worse.

Published in Guest case study

GUEST OPINION: Australia is progressing steadily with an open banking rollout. The Big Four banks – CBA, Westpac, ANZ and National Australia Bank – introduced open banking in July 2021, and other banks and financial services are expected to follow in 2022. According to many fintechs, however, the introduction is going slower than expected, and they are pushing financial markets to open their banking services online by signing additional data holders.

Published in Guest Opinion

More needs to be done to protect against application security threats, particularly newer threats like bot attacks, API attacks, and supply chain attacks, according to one global security firm.

Published in Security

GUEST OPINION by Pasacal Geenens, Radware:   Knowing  and understanding the most important cyber threats that an e-commerce business will face is crucial this busy holiday shopping season.

Published in Guest Opinion
Thursday, 20 August 2020 19:25

How to Keep APIs secure from bot attacks

GUEST OPINION by Yaniv Hoffman, Vice President Technologies, Radware: The widespread adoption of mobile IoT devices, emerging ‘serverless’ architectures hosted in public clouds, and the growing dependency on machine-to-machine communication, are reasons to make changes to modern application architectures.

Published in Guest Opinion
Tuesday, 18 August 2020 23:01

Auth0 defends against credential-stuffing bots

Identity platform provider Auth0 has added Bot Detection to its services.

Published in Security

GUEST OPINION by Pavan Thatha, Radware: The data sought by cybercriminals vary from one vertical to another, whether banking credentials, medical records, pricing information or confidential research, to name just a few.

GUEST OPINION by Pavan Thatha, Radware: The data sought by cybercriminals vary from one vertical to another, whether banking credentials, medical records, pricing information or confidential research, to name just a few.

Published in Security

Subscribe to Newsletter

*  Enter the security code shown: img0

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments