Recent talks on DDoS


Muestreo de tráfico y ataques DDoS: Cómo medir con precisión el impacto
En esta sesión, exploraremos cómo los diferentes tipos de muestreo sFlow pueden utilizarse para analizar el tráfico DDoS de manera efectiva. ¿Qué puedes
esperar? - Visión general de los tipos de muestreo: Comparación entre muestreo plano (flat) y relativo (relative). - Componentes clave de Corero SmartWall
ONE™: Explicación de los módulos responsables de la creación y el análisis de muestras de tráfico. - Análisis comparativo del tráfico: Evaluación estadística…


Optimizing Healthcare Cybersecurity: Threat Trends, DDoS Defense, and API Security
As healthcare organizations accelerate their digital transformation, they face an evolving landscape of cyber threats, from DDoS attacks and ransomware to
vulnerabilities in API security. With healthcare data, financial data and critical systems increasingly interconnected, the need for robust cybersecurity
measures has never been greater. In this session, we’ll explore key trends and best practices for leaders to safeguard and advance a secure and scalable h…


Evaluación y medición del riesgo de un ataque DDoS actualmente
¿cómo protege Prolexic a los clientes de Akamai y por qué es importante? La cantidad de ataques DDoS mitigados instantáneamente a través de la
plataforma Prolexic ha aumentado exponencialmente en los últimos años. Akamai mitiga los ataques DDoS contra su plataforma Prolexic a través de
controles de mitigación proactivos, en 0 segundos y sin impacto en el cliente. Pero, ¿qué ha sucedido con los ataques DDoS últimamente? Únase a nuestro…


Ensuring Service Availability in Healthcare
Ensuring Service Availability in Healthcare Insights from Myriad360’s Daniel Lakier and Main Line Health’s Kevin Werner The healthcare industry faces a
growing cybersecurity challenge—DDoS attacks that threaten critical service availability. These attacks are no longer just an IT issue; they are a board-level
concern with direct implications for patient care and operational resilience. Join Corero’s Michael Honeycutt, Myriad360’s Daniel Lakier, and Main Line Heal…
![[Alerte Europpéenne] Hacktivistes géopolitiques lancent campagne massive DDoS contre organisations européennes](https://www.brighttalk.com/portal/_next/image?url=https%3A%2F%2Fcdn.brighttalk.com%2Fams%2Fireland%2Fimages%2Fcommunication%2F636777%2Fimage_1028004.jpg%3Fwidth%3D640%26height%3D360&w=3840&q=70)

[Alerte Europpéenne] Hacktivistes géopolitiques lancent campagne massive DDoS contre organisations
européennes
Les tensions géopolitiques entraînent une nouvelle vague d’hacktivisme qui cible les organisations européennes, qu'elles soient politiques ou non. Les
hacktivistes utilisent des attaques DDoS tsunami, qui sont perturbatrices et plus difficiles à détecter et à atténuer par les solutions de cybersécurité
traditionnelles. Venez écouter nos experts en cybersécurité échanger sur : 1. La récente vague de cyberattaques visant les secteurs de la finance, du gouv…
![[Europe Alert] Geo-Political Hacktivists Launch Massive DDoS Campaign Against European Organizations](https://www.brighttalk.com/portal/_next/image?url=https%3A%2F%2Fcdn.brighttalk.com%2Fams%2Fcalifornia%2Fimages%2Fcommunication%2F636776%2Fimage_1026234.png%3Fwidth%3D640%26height%3D360&w=3840&q=70)

[Europe Alert] Geo-Political Hacktivists Launch Massive DDoS Campaign Against European
Organizations
Geo-political tensions are driving a new wave of hacktivism that targets political and non-political European organizations. Hacktivists are employing
disruptive DDoS tsunami attacks that are harder to detect and mitigate by standard cyber security solutions. Please join us to hear our cyber experts
discussing: 1. The recent wave of cyber-attacks targeting FSI, Government, Retail and Transportation in Europe 2. Who are the threat actors behind theses …


2025 Threat Report – Cybersecurity Trends in Canada
Inside the 2025 Global Threat Analysis Report Join Chip Witt, Radware’s Principal Security Evangelist, as he breaks down the key findings, including: - Key
factors behind the 2024 cyberthreat revolution in Canada - How AI democratizes sophisticated cyberattacks on Canadian organizations - Why lone
hacktivists are now collaborating—and what it means for Canada’s cybersecurity - How the global doubling of DDoS frequency, volume and duration affect…
Coming up next


Securing Financial Institutions: Navigating the Next Wave of Cyber Threats
Join us for an engaging fireside chat as we explore the evolving cyber threat landscape targeting the financial sector. We'll discuss key insights into the rise in
DDoS attacks, AI-driven bot traffic, and sophisticated phishing campaigns. Learn how attackers are leveraging AI to bypass defenses and execute deepfake
phishing, and understand the impact of prolonged DDoS-as-a-Service and hacktivist campaigns. We'll also dive into the credential stuffing economy, reveali…


Hybrid/Public/Private Clouds: Which Cloud is Right for Your Infrastructure?
Navigating the complex landscape of cloud solutions is a critical decision with far-reaching implications for your business. Understanding the strengths and
trade-offs of hybrid, public, and private clouds is essential to building a strategy that aligns with your organisation’s needs. Join us for this insightful EcoCast,
where top experts from leading cloud providers will explore the advantages and key considerations of each cloud model. Discover practical tools, tips, and …


Ep. 15 BOPLA-Driven API Security: Enforcing Process-Level Authorization for Threat Mitigation
APIs are a growing attack vector, exposing organizations to threats like unauthorized access, injection attacks, and abuse. Traditional access control models
struggle to enforce business-specific authorization, leading to security gaps. In episode 15 of If Your APIs Could Talk, we examine API3:2023, BOPLA
(Business-Oriented Process-Level Authorization) as a solution for implementing fine-grained, context-aware access controls within APIs. We will cover key se…


Observability for Business Leaders: From Cost Center to Competitive Advantage
Observability isn’t just for IT — it’s a strategic tool for optimising costs, driving revenue, and improving resilience. Join Bryan Glick (Computer Weekly) and
experts from Akamai & Hydrolix as they explore how businesses leverage observability to reduce downtime, enhance decision-making, and fuel innovation.
What you will learn: - How to transform observability into a business growth driver - Strategies to optimise costs, improve resilience, and accelerate digital t…

Transform API Security with Unmatched Discovery and Defense
APIs power modern applications but are prime targets for OWASP API Security Top 10 threats like Broken Object Level Authorization (BOLA). Organizations
need a proactive approach to detect and mitigate these evolving risks. Join us to discover how Imperva is reinventing API security with: • Unlimited API
Discovery – Gain full visibility into shadow, zombie, and high-risk APIs, with a highlight on the new cloud WAF add-on • Real-Time Threat Protection – Detect …


Securing Financial Institutions: Navigating the Next Wave of Cyber Threats
Join us for an engaging fireside chat as we explore the evolving cyber threat landscape targeting the financial sector. We'll discuss key insights into the rise in
DDoS attacks, AI-driven bot traffic, and sophisticated phishing campaigns. Learn how attackers are leveraging AI to bypass defenses and execute deepfake
phishing, and understand the impact of prolonged DDoS-as-a-Service and hacktivist campaigns. We'll also dive into the credential stuffing economy, reveali…


Empower Platform Engineering with SUSE Rancher Prime for Cloud Native
Join our Cloud Native expert on April 8th and discover everything you need to deploy, run, and manage all of your containerized workloads. During this virtual
session, we will discuss how SUSE Rancher Prime provides your organization with: ● Simple, consistent operations from data center to Edge ● Trusted,
secure delivery ● Complete lifecycle management ● Industry leading container security, storage, VM management, and Linux OS ● Access to broad ecosy…


Unlocking MSP Growth with True Mesh DDoS Protection – TierPoint’s Success Story
Discover how TierPoint is setting a new standard in managed service security with real-time, True Mesh DDoS protection. In this exclusive fireside chat,
TierPoint’s CISO Paul Mazzucco shares how Corero’s advanced DDoS defense has enhanced service availability, improved threat visibility, and enabled
seamless security across multiple data centers. Why Attend? Hear firsthand how TierPoint reduced DDoS mitigation times from minutes to seconds Learn …
Attend Summits on DDoS
Cyber Threats and Breach Protection
Cybersecurity Ventures expects global cybercrime to reach $10.5 by 2025 - up from $3 trillion in 2015. With this staggering growth putting businesses of all
sizes at risk, it’s essential that organizations understand the latest threats and trends defining the 2022 threatscape. Join key industry professionals and lead…
The 2023 Threatscape
2023 will see organizations battle a more complex threatscape than ever before, with web application breaches continuing to rise, credential theft and
credential stuffing remaining a concern, and ransomware demands hitting the big players. As a result, it’s no wonder that CISOs and security practitioners a…
CISO Summit
CISOs are dealing with unprecedented challenges. The integration of AI in both attack and defense mechanisms coupled with the rise of increasingly
sophisticated cyber threats means they must protect against more complex attacks while aligning security strategies with broader business objectives. T…
Securing the Cloud Ecosystem
The use of the cloud is becoming omnipresent, with 85% of organizations planning to embrace the cloud-first principle, according to Gartner. However, cyber
attackers are exploiting this trend. They leverage the cloud’s wide attack surface and low visibility as gateways to breach IT infrastructure. The good news …
Advancing Application Security Practices
Explore the latest trends in AppSec from cloud-native protection with service mesh to fortified API security, authentication, rate limiting, and vigilant
monitoring.
CISO Strategies (APAC Edition)
With the rise in breaches and cyber crime, organizations around the world face an increased risk of loss, not only to their financial bottom line, but also in
damages to their reputation and customer satisfaction. Discover how CISOs are continually building and implementing their security strategy, and the tools …
Watch series about DDoS

Problem Solvers: DDoS Protection
The Problem Solvers Series is focused on helping NetOps and SecOps professionals solve their most complex problems affecting performance and security.

DDoS Attack TTPs Series
Calling all Carrier Service Providers and ISPs. Cybercriminals use a mix of tactics, techniques, and procedures, both old, new, and in combination, to disrupt
your service and compromise the experience you provide to your customers. Join NETSCOUT as we delve into some of the most popular and the most disr…

Webinar Series: 2025 Cybersecurity Threats and Trends - A Global Outlook
Join Radware’s cybersecurity experts for an exclusive webinar series offering actionable insights on the latest threat intelligence, attack trends, and
vulnerabilities for 2025. This series is designed for security leaders and decision-makers to stay ahead of evolving cyber threats. --- 1. Executive Briefing: R…

App and API Security | Akamai
Applications run our world. But as applications and users proliferate, so do security risks. Discover the latest application and API attack trends in Asia-Pacific,
and gain actionable insights from our Akamai security experts to protect your business.

F5 Demo Days Sessions
Experience F5’s comprehensive, easy-to-use SaaS security solution F5 Distributed Cloud Services are SaaS-based security, networking, and application
management services that enable customers to deploy, secure, and operate their applications in a cloud-native environment wherever needed – data cent…

Black Hat 2023 | Akamai
Missed Black Hat 2023? We have you covered in this compelling on-demand webinar series with our Akamai security experts. Discover the latest threat
research covering ransomware, DDoS attacks, API vulnerabilities, and account takeovers, along with invaluable best practices to safeguard your organizatio…