Akamai has acquired Guardicore to extend its Zero Trust solutions and help stop ransomware. Read more

PRESS RELEASES

Akamai Security Experts To Present On Credential Stuffing, Evolution Of HTTP Protocol At Black Hat Europe 2017

Cambridge, MA USA | December 03, 2017

Share

Akamai Technologies, Inc. (NASDAQ: AKAM), the world's largest and most trusted cloud delivery platform, today announced that several of its security experts will be presenting at the Black Hat Europe 2017 conference this week in London. Black Hat is the most technical and relevant global information security event series in the world. For more than 18 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. The conference is taking place December 4-7 at ICC Capital Suite, ExCeL London.

On December 7, Akamai’s Security Data Analyst, Elad Shuster will discuss "Passive Fingerprinting of HTTP/2 Clients".

HTTP/2 is the second major version of the HTTP protocol. It changes the way HTTP is transferred "on the wire" by introducing a full binary protocol that is made up of TCP connections, streams, and frames, rather than a plain-text protocol. Such a fundamental change from HTTP/1.x to HTTP/2, means that client-side and server-side implementations have to incorporate completely new code in order to support new HTTP/2 features. During this talk, Elad will introduce nuances in protocol implementations, which, in return, might be used to passively fingerprint web clients.

What: Passive Fingerprinting of HTTP/2 Clients
When: December 7, 3:15-4:15 p.m. GMT
Where: ICC Capital Suite, Level 3, Room A

Also on December 7, Akamai's Senior Enterprise Architect Brent Maynard and Solutions Architect Sonia Burney will present "Becoming You: A Glimpse Into Credential Abuse".

In recent years, security threats have exponentially increased, as have the potential solutions to detect and mitigate credential stuffing. The question often is, where in the workflow to deploy respective detection and mitigation strategies that are risk averse while maintaining efficacy. In this talk, Brent and Sonia will discuss how to detect and mitigate vulnerabilities using CDNs or existing back end platform architecture.

What: Becoming You: A Glimpse into Credential Abuse
When: December 7, 4:30-5:00 p.m. GMT
Where: ICC Capital Suite, Level 3, Room B

Last week, Akamai released its Third Quarter, 2017 State of the Internet / Security Report. The report, using data gathered from the Akamai Intelligent Platform, provides analysis of the current cloud security and threat landscape, as well as insight into the ever-changing landscape of attack trends and tools – delivering information to help you and your team protect your organization. A complimentary copy of the report is available for download at Akamai.com/stateoftheinternet-security.

About Akamai

Akamai powers and protects life online. The most innovative companies worldwide choose Akamai to secure and deliver their digital experiences - helping billions of people live, work, and play every day. With the world's largest and most trusted edge platform, Akamai keeps apps, code, and experiences closer to users - and threats farther away. Learn more about Akamai's security, content delivery, and edge compute products and services at www.akamai.com, blogs.akamai.com, or follow Akamai Technologies on Twitter and LinkedIn.