Cost-Benefit Analysis and TCO of WAF Deployment Models
Evaluation of deployment models through a total cost of ownership(TCO) perspective over a span of 3-5 years
Evaluation of deployment models through a total cost of ownership(TCO) perspective over a span of 3-5 years
Using human behavior patterns to create digital fingerprints for WAF
Advanced WAF strategies combine rule optimization with AI-based anomaly detection and continuous monitoring
Operating WAF as Code
Our journey to automated certificate management
Ever get curious about how an electronic mail passes through the internet
Let’s talk about operating Akamai WAF - the right way
Certificate Lifecycle is not alchemy
Why Your SOC Needs a Human-Centered Command Center
Detection v prevention - agility v prohibition
Cyber Defense - before you start building a change programme
Let me walk you through the process of configuring Akamai’s WAF
We have seen so much that we can instantly see through new vendors’ buzzwords.
Reclaim Control
Dns Defense Transformation - first we fortified their DNS
Walled Garden Transformation into Open Space
Bridging Cyber Talent Gap
Building Infosec Service - why end-to-end ownership is key