- Filter by:
-
Topic
-
The Forrester Total Economic Impact™ of Akamai Security Products
How can you meet the challenge to quantify the cost savings and business benefits of Akamai security products? To answer this question, Akamai commissioned Forrester Consulting to conduct a study in which they interviewed or surveyed 35 Akamai customers to develop both a study and a tool. The study uses...
Download Now -
Top 10 Active Directory Security Reports and Alerts You Need
Strengthen your cyber resilience and spot active threats with Change Auditor by Quest. Today, identity is the new perimeter — hackers are actively targeting your users’ accounts and using compromised credentials to wreak havoc inside your network. Add to that the risks associated with malicious insiders and stressed-out...
Read More -
Hacking Active Directory – From a Pen Tester
Globally, more than 95 percent of Fortune 1000 companies rely on Active Directory (AD) for authentication and single-sign-on support for their user populations. As it is nearly everywhere – in every company, organization and government agency – this makes AD a primary target for attackers looking to steal your...
Read More -
Preparing for Attacks that Seek Total Annihilation
The threat landscape has changed dramatically. Are you prepared for the new destructive attacks? IT and security pros have been battling serious threats for a long time. On the one hand are risks like power outages, hardware failures and natural disasters. On the other are malicious insiders and...
Read More -
BIOS Security - The Next Frontier for Endpoint Protection
Everyone is familiar with the process of booting up a computer. Many of us do this every day - pressing the power button, hearing the startup sound, and seeing the home screen appear. But even some tech professionals may not be aware of what's happening under the surface of their...
Find Out More -
Market Guide for Zero Trust Network Access
In the 2020 Market Guide for Zero Trust Network Access (ZTNA), Gartner evaluates technologies that enable secure access to internal applications based on identity, context, and policy adherence — regardless of user or application type or location. According to Gartner, “ZTNA improves the flexibility, agility, and scalability of application access,...
Download Now -
The Future of Network Security Is in the Cloud
Users, devices, applications, and data are now located outside of the enterprise. It’s time to rethink your network security delivery model. According to Gartner, “Security and risk management leaders need a converged cloud-delivered secure access service edge (SASE) to address this shift.” Meet the network security needs of...
Download Now -
2020 State of the Internet / Security: Financial Services – Hostile Takeover Attempts
High-value targets generally attract sophisticated criminals and attacks. This new State of the Internet / Security report looks at financial services and finds several emerging trends which could impact other industries. Learn about spikes in credential stuffing attacks against APIs, LFI passing SQLi as a leading web attack vector, and...
Download Now -
DDoS Extortion Battle Checklist
Akamai has recently observed and mitigated an unprecedented number of extortion-driven DDoS attacks across numerous verticals, including manufacturing, gaming, and financial services. Is your organization prepared to respond if you’re a target of a DDoS extortion group? In our new security checklist, learn the key responses organizations should take if...
View This Now -
Web Application and API Protection Capabilities Checklist
Deploying a web application and API security solution is often a complex process. Organizations considering implementation of a new solution are likely also optimizing a current information security strategy to help address their unique risks and security gaps. In our new checklist, you’ll discover the important categories organizations should focus...
Download Now