In this companion podcast, the 2019 F5 Labs Application Protection Report researchers examine how both apps and threats are changing, and what security practitioners can do to stay ahead of these changes.
…
continue reading
1
Season 2: Episode 4 - API Attacks and New Architectures
27:36
27:36
Play later
Play later
Lists
Like
Liked
27:36
In the fourth and final episode for 2019, Sara, Ray, and Sander talk about attacks against application programming interfaces (APIs), and how they’ve spiked in the last two years. As with the formjacking attacks discussed in Episode Two, API attacks have become more common because of changes in how organizations design and run applications. The tea…
…
continue reading
1
Season 2: Episode 3 - Access Attacks Take Top Spot
35:18
35:18
Play later
Play later
Lists
Like
Liked
35:18
The Labs team drills down into the topic of access tier attacks, which were the single most successful attack type in the past year, according to public breach reports. These attacks, which include techniques like phishing, credential stuffing, and brute force attacks, made up a huge proportion of the successful attacks that organizations disclosed…
…
continue reading
1
Season 1: Episode 2 - Application Protection—Mitigating Risk at the App Services Tier
18:54
18:54
Play later
Play later
Lists
Like
Liked
18:54
What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore…
…
continue reading
1
Season 1: Episode 3 - Application Protection—Mitigating Risk at the Access Tier
17:24
17:24
Play later
Play later
Lists
Like
Liked
17:24
What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore…
…
continue reading
1
Season 1: Episode 4 - Application Protection—Mitigating DDoS Attacks
19:44
19:44
Play later
Play later
Lists
Like
Liked
19:44
What makes an app, really? Is application security, as we’ve known it, keeping pace with today’s threats? F5 Labs security experts spent a year researching the composition of an app, the increasingly essential role they play in today’s digital world, to better answer these questions. Join threat researchers Sara Boddy and Ray Pompon as they explore…
…
continue reading
1
Season 1: Episode1 - Application Protection
15:11
15:11
Play later
Play later
Lists
Like
Liked
15:11
F5 Labs security experts spent a year researching the increasingly essential role of applications with one question in mind: If organizations don’t understand all the ways attackers can compromise their applications and exploit their data, how can they possibly defend their most critical assets? Join threat researchers Sara Boddy and Ray Pompon in …
…
continue reading
The Labs team dives into the subject of injection—one of the most prevalent and successful attack techniques featured in the breach notifications. Injection techniques have been around for a long time, and constituted a major finding in the 2018 report, but they’re evolving to target different vulnerabilities because of the way that web application…
…
continue reading
1
Season 2: Episode 1 - Methods, Easy Targets, and Breach Data
21:30
21:30
Play later
Play later
Lists
Like
Liked
21:30
Sara begins by unpacking what’s changed in this year’s research, covering changes in personnel, data sources, and research scope. The team then turns to the first significant finding of the new research series: the discovery of widespread, unsophisticated reconnaissance campaigns targeting PHP. While systems running PHP were a major target last yea…
…
continue reading