Skip to main content
Blue Code Hero Background

Akamai Security Experts To Present On Credential Stuffing, Evolution Of HTTP Protocol At Black Hat Europe 2017

Cambridge, MA USA | December 03, 2017


Akamai Technologies, Inc. (NASDAQ: AKAM), the world's largest and most trusted cloud delivery platform, today announced that several of its security experts will be presenting at the Black Hat Europe 2017 conference this week in London. Black Hat is the most technical and relevant global information security event series in the world. For more than 18 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. The conference is taking place December 4-7 at ICC Capital Suite, ExCeL London.

On December 7, Akamai’s Security Data Analyst, Elad Shuster will discuss "Passive Fingerprinting of HTTP/2 Clients".

HTTP/2 is the second major version of the HTTP protocol. It changes the way HTTP is transferred "on the wire" by introducing a full binary protocol that is made up of TCP connections, streams, and frames, rather than a plain-text protocol. Such a fundamental change from HTTP/1.x to HTTP/2, means that client-side and server-side implementations have to incorporate completely new code in order to support new HTTP/2 features. During this talk, Elad will introduce nuances in protocol implementations, which, in return, might be used to passively fingerprint web clients.

What: Passive Fingerprinting of HTTP/2 Clients
When: December 7, 3:15-4:15 p.m. GMT
Where: ICC Capital Suite, Level 3, Room A

Also on December 7, Akamai's Senior Enterprise Architect Brent Maynard and Solutions Architect Sonia Burney will present "Becoming You: A Glimpse Into Credential Abuse".

In recent years, security threats have exponentially increased, as have the potential solutions to detect and mitigate credential stuffing. The question often is, where in the workflow to deploy respective detection and mitigation strategies that are risk averse while maintaining efficacy. In this talk, Brent and Sonia will discuss how to detect and mitigate vulnerabilities using CDNs or existing back end platform architecture.

What: Becoming You: A Glimpse into Credential Abuse
When: December 7, 4:30-5:00 p.m. GMT
Where: ICC Capital Suite, Level 3, Room B

Last week, Akamai released its Third Quarter, 2017 State of the Internet / Security Report. The report, using data gathered from the Akamai Intelligent Platform, provides analysis of the current cloud security and threat landscape, as well as insight into the ever-changing landscape of attack trends and tools – delivering information to help you and your team protect your organization. A complimentary copy of the report is available for download at

About Akamai

Akamai powers and protects life online. Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every day. With the world’s most distributed compute platform — from cloud to edge — we make it easy for customers to develop and run applications, while we keep experiences closer to users and threats farther away. Learn more about Akamai’s security, compute, and delivery solutions at and, or follow Akamai Technologies on Twitter and LinkedIn.