Featured

APIs: The Attack Surface That Connects Us All
Chad Bailey,Senior Solutions Engineer
Applications run our world, they run your business. They also introduce vulnerabilities that multiply as we become ever more connected.
APIs help enable that business growth as the connective tissue that powers digital transformation. Their adoption is widespread, with businesses continually opening API access to more partners, applications, mobile apps, and IOT devices.
But how are organizations expected to protect this ever-changing API estate?
This API blindspot is becoming the biggest security problem for today’s businesses.
All episodes
-
Max Damage: Ransomware's Evolving Exploitation Techniques
Tony Lauro, Director, Security Technology and Strategy
Ransomware groups are on the move, using methods of victimization such as 0-day and 1-day vulnerability abuse, and multiple extortion schemes to maximize damage to businesses. Learn how you can stop this threat.
-
Cover Your Apps: App and API Attacks on the Rise
Pablo Calderon, Senior Solutions Engineer
As organizations grow and continue to adopt more web applications to improve business operations, this attack surface continues to expand. 2022 was a record year when it comes to web applications and API attacks.
With an exponential increase in API traffic, is estimated that by 2024, API abuses and related data breaches will nearly double. So, understanding the different trends and new attack vectors is becoming crucial to organizations as they look to secure business critical applications.
Learn more about how these attacks are affecting every industry and what are the recommendations to secure your web applications and APIs.
-
DDoS Respawn
Jeff Stout, Senior Enterprise Security Architect II
Distributed Denial of Service (DDoS) is one of the oldest forms of cyberattacks. In recent years, driven by political hacktivism and state-sponsored cyber-terrorism, there has been a significant resurgence in the record-setting scale, size, duration, and the sophistication of DDoS attacks.
Akamai’s Prolexic has been the most trusted and effective DDoS mitigation and protection platform for businesses and institutions. Join us to learn how we keep Prolexic always a step ahead of the rapidly evolving threat landscape.
-
Using AI to Prevent Accounts Abuse
Sean Flynn, Director, Security Technology and Strategy
Account abuse and account takeover attacks are a major problem for companies across multiple industries.
In 2022, it was estimated that account abuse caused companies over 20 billion dollars. Attackers use advanced tools and techniques that can make identifying them incredibly difficult.
Learn how AI can identify real users and attackers by collecting data about user interacting with your application. You might just find that sometimes the key to identifying attackers is by accurately knowing your users in a way only AI can.
-
OWASP Top 10 API Security Risks
Jeff Stout, Senior Enterprise Security Architect II
Learn more about how to protect yourself against the OWASP API Top 10 vulnerabilities, and how the 2023 update compares to the 2019 list.
-
How to Min-Max Your Security Posture Using a Free Cyber Build Planner
Dan Petrillo, Director, Product Marketing
There's no shortage of paths you can take to deal with modern attacks. But how can you optimally secure your business when stat points are limited?
Learn how to spend your next minute, dollar, or level-up as efficiently as possible by analyzing the threat actors that target businesses like yours. Using the MITRE ATT&CK navigator as a cyber build planner, you can be sure you have the tools to win…even on hard mode.
-
APIs: The Attack Surface That Connects Us All
Chad Bailey,Senior Solutions Engineer
Applications run our world, they run your business. They also introduce vulnerabilities that multiply as we become ever more connected.
APIs help enable that business growth as the connective tissue that powers digital transformation. Their adoption is widespread, with businesses continually opening API access to more partners, applications, mobile apps, and IOT devices.
But how are organizations expected to protect this ever-changing API estate?
This API blindspot is becoming the biggest security problem for today’s businesses.