Attend Summits on Researcher
The 2023 Threatscape
2023 will see organizations battle a more complex threatscape than ever before, with web application breaches continuing to rise, credential theft and
credential stuffing remaining a concern, and ransomware demands hitting the big players. As a result, it’s no wonder that CISOs and security practitioners a…
360° Cloud Security for 2023
Cloud security threats in 2023 range from data breaches, insider threats and even insecure interfaces and APIs. The threats are numerous, and creating and
implementing a strategy to contend with them requires more planning and research than ever before.
The Future of Software Development
Developing software is top priority for today’s organizations as the working world is increasingly dependent on its applications. Software development is in the
process of evolving with emerging technologies like AI, edge computing, low code/no code and cloud services reshaping how it is planned, produced and del…
New Age of Managing Data
The data management field is changing, driven by trends like data democratization, integration of AI and machine learning, data governance and data
analytics. Organizations looking to wisely handle their data should stay on top of trends while discerning what would work best for their environment. With t…
Strengthening Cyber Security with AI
AI is gradually integrating itself into organization’s cyber security strategy. Companies are increasingly using AI to automate capabilities like threat detection,
predictive analytics, incident response and more. AI even supports machine learning- algorithms to detect unusual behavior that may indicate a coming att…
Machine Learning & Artificial Intelligence
As AI and machine learning continue to create value streams across different industries and verticals, organizations are still looking for strategies to ease
adoption of these impactful technologies. With sometimes significant challenges to AI Integration needing to be overcome, this three day Summit of free tal…
Watch series about Researcher

Monthly Threat Brief: The SIG Download
Navigating the dynamic landscape of security requires diverse perspectives. Join Akamai's Security Intelligence Group (SIG) in our concise monthly webcast
series, where we decode the most significant threats and cutting-edge research from the past 30 days in just 15 minutes. With insights from over 300 globa…

THREE BEERS IT
IT After Hours A home for disinhibited conversations about the world of IT, the things that don’t get said until you’re on your 3rd beer… With your host, John
Burke, CTO and lead researcher at Nemertes. Three Beers IT urges listeners of legal drinking age to drink responsibly and not spill. It shorts out the equip…

Investigating Advanced Persistent Threats
Advanced persistent threat actors are constantly seeking new, more sophisticated ways to perform their attacks. While the TTPs of some threat actors
remain consistent over time, others refresh their toolsets and extend the scope of their activities to launch new malicious campaigns. Organizations need t…

The BLADE Framework: The MITRE ATT&CK-style Framework for Bot Attacks
Just as security professionals rely on MITRE ATT&CK to help them understand technical vulnerabilities, the BLADE Framework® is a vital learning tool in the
battle against bot attacks like credential stuffing, scraping and scalping. The BLADE Framework is an open-source educational resource describing a wide r…