When Bots Attack! Stopping OWASPs New Top 20 Automated Threats

August 2, 2016
The OWASP Top 10 Vulnerabilities, last published in 2013, has been a valuable list of criteria by which any Web Application Firewall (WAF) is evaluated, but has a glaring flaw, it only focuses on vulnerabilities in the code, and ignores automated threats. In late 2015, this flaw was addressed and OWASP released the first Automated Threat Handbook specifically to help organizations better understand and respond to the notable worldwide increase of automated threats from bots. This presentation discusses these new threats, attack evolution, and how to fight back. Watch this video with Distil Networks' CEO, Rami Essaid and learn: - How malicious bots attack and cause problems - Why homegrown IT solutions have troubles keeping up with bots, threats - Demo: See Distil Networks in action finding, fighting bots
Previous Video
OWASP Automated Threats Explained - Carding, Card Cracking and Cashing Out
OWASP Automated Threats Explained - Carding, Card Cracking and Cashing Out

In order to protect your website, you need to know how you’re being attacked. Carding, Card Cracking and C...

Next Video
Classifying Your API Traffic with Distil
Classifying Your API Traffic with Distil

In this tutorial video, you'll learn how to use the Traffic Classifications report to view all of the reque...