Featured

Thwart the Account Takeover Menace – Join the API Security Conversation
Angel Grant, Vice President of Security, F5 | Joshua Haslett, Strategic Technology Partner Manager Google Cloud
APIs have become one of cybercriminals’ favorite vectors for account takeover attacks. Credential stuffing, business logic abuse, and DDoS attacks are just some of the malicious automated bot attacks deployed to take over accounts and perpetrate identity theft and fraud.
Readily available scripts and tools make orchestrating API attacks easier than ever, and legacy bot defense techniques struggle to detect these potentially devastating incursions. Thus, it’s no surprise that, according to recent Google Cloud research, 50% of organizations experienced an API security incident in the past 12 months.
With such a dire threat via APIs negatively impacting user data and the bottom line, F5 and Google Cloud are hosting a panel discussion to answer your pressing questions about API security and tactics.
Join the conversation to hear F5’s Vice President, Security, Angel Grant’s answers to hard-hitting questions about account takeover attacks and API security.
Join the webinar to see Angel on the API security hot seat and learn:
- What’s the current threat landscape targeting APIs
- How exploits in API business logic can lead to fraud
- Defense tactics against API injections
- How to mitigate potential brand and reputational damage
- Why legacy bot detection techniques have become ineffective
- How to best decern between good and bad traffic – both human and bot
Learn more, register today
All episodes
-
Bots to Board Room: The Often-Missed Economic Impact of Bots
Jim Downey, Cybersecurity Evangelist at F5 | Joshua Haslett, Strategic Technology Partner Manager at Google Cloud
While security and operations teams care deeply about their ability to deliver the best experience possible for their customers while enhancing operational efficiencies, there is plenty left for the board and the executive staff to consider when it comes to bots and automated attacks.
Join Joshua Haslett, Strategic Technology Partner Manager at Google Cloud, and Jim Downey, Cybersecurity Evangelist at F5, for an in-depth conversation to help crack the code on “bot economics” so you can learn how to:
• Calculate financial revenue and reputation costs
• Identify and control operational expenses
• Develop a cost/benefit analysis for bot mitigation
• Prepare for that much-needed business conversation with key stakeholdersF5 Distributed Cloud Bot Defense for Google Cloud enables frictionless security that complements performance, automation, and insight to deliver and scale the application experience. Join the conversation to determine the economic impact of bots on your business so you can demonstrate to the board that the top and bottom lines are safe from bot-generated compromise.
-
Stop Bad Actors From Attacking Your Mobile Apps
FEATURING Peter Zavlaris Cyber Security Evangelist, F5 | Joshua Haslett Strategic Technology Partner Manager, Google Cloud
Attackers will repackage mobile apps, inject malware, hooking frameworks, and perform overlay attacks to cause security breaches, data leaks, and gain privileged access. Once a mobile app is controlled or hijacked, attackers can attack your server-side applications using automated attacks. They will also steal sensitive data that resides in your mobile apps, such as customer credentials, API keys, and intellectual property. You are on the hook for rigorous compliance standards for privacy (ex: GDPR, CCPA), payments (ex: EMVCo SBMP, PCI, & PSD2), and health records (HIPAA).
Part of picking the right infrastructure is knowing you can extend secure experiences to mobile applications. With intellectual property and sensitive information flowing through these mobile apps, it’s important to understand the risk and what you can do to make this a safe channel for your business.
You’ll also learn more about F5’s new mobile app security solution which can help you reduce security risk and meet compliance. Join the conversation and see how mobile application security can be a bigger part of your secure application vision.
-
Thwart the Account Takeover Menace – Join the API Security Conversation
Angel Grant, Vice President of Security, F5 | Joshua Haslett, Strategic Technology Partner Manager Google Cloud
APIs have become one of cybercriminals’ favorite vectors for account takeover attacks. Credential stuffing, business logic abuse, and DDoS attacks are just some of the malicious automated bot attacks deployed to take over accounts and perpetrate identity theft and fraud.
Readily available scripts and tools make orchestrating API attacks easier than ever, and legacy bot defense techniques struggle to detect these potentially devastating incursions. Thus, it’s no surprise that, according to recent Google Cloud research, 50% of organizations experienced an API security incident in the past 12 months.
With such a dire threat via APIs negatively impacting user data and the bottom line, F5 and Google Cloud are hosting a panel discussion to answer your pressing questions about API security and tactics.
Join the conversation to hear F5’s Vice President, Security, Angel Grant’s answers to hard-hitting questions about account takeover attacks and API security.
Join the webinar to see Angel on the API security hot seat and learn:
- What’s the current threat landscape targeting APIs
- How exploits in API business logic can lead to fraud
- Defense tactics against API injections
- How to mitigate potential brand and reputational damage
- Why legacy bot detection techniques have become ineffective
- How to best decern between good and bad traffic – both human and botLearn more, register today
-
Untangling APIs: Addressing Sprawl and Securing Your Digital Ecosystem
Ian Dinno,Sr. Manager, F5 | David Remington, F5 | Joshua Haslett, ]Strategic, Technology Partner Mgr Google Cloud
As organizations increasingly adopt hybrid architectures and microservices, the number of APIs utilized within their ecosystems continues to grow at an exponential rate. This phenomenon, known as API sprawl, poses significant challenges in terms of security, governance, and efficiency. But of them all, API security might require the most urgent response.
For organizations trying to secure their APIs, multi-cloud complexity and difficulty enforcing consistent security top the list of challenges according to F5’s State of Application Strategy Report (2023). To address API sprawl, organizations need to adopt a more holistic app and API security strategy for their organization including components that deliver runtime protection, posture management, and help integrate security and code testing earlier in the software development lifecycle.
Join the conversation to hear Joshua Haslett, Ian Dinno, and David Remington's answers to hard-hitting questions about API sprawl, management and security.