Managing Bot-based Attacks with Threat Detection - Security Boulevard

SBN Managing Bot-based Attacks with Threat Detection

As originally appeared in the TAG Cyber 2021 Security Annual report

Bot Attack and Threat Detection

The term “digital transformation” has been in the popular business lexicon for quite a while. In the wake of the COVID-19 pandemic, we’ve seen changes to the digital world that

DevOps Experience

no one could have predicted, including a significant and sudden uptick in online transactions and interactions—all at a startling pace. Satya Nadella of Microsoft wrote, “In this era of remote everything, we have seen two years’ worth of digital transformation in two months.”

As the world has become more digital, businesses must transform risk calculations, and one area that often gets overlooked is bot-based activity. Bot traffic mimics people, automatically testing username/password combinations and credit card information on websites. While credit card skimming used to be considered a physical threat from a point of sale, it can now happen anytime business is conducted online. Additionally, so-called shopping assistants offer coupons that distract shoppers from their path to purchase, sometimes redirecting shoppers to a competitor’s site for a similar product or the same one at a lower price.

Organizations need to recognize these hidden threats as they transform. To reduce cyber risk, and to protect revenue, organizations are turning to application protection solutions such as those from PerimeterX. The company’s flagship product, PerimeterX Bot Defender, is a behavior-based bot management solution which helps stop bot attacks and keep companies free from account takeover, carding, and operational disruption. We spoke with Ido Safruti, co-founder and CTO of PerimeterX, about why companies can’t forget about web-facing threats.

TAG Cyber: Attackers’ techniques are ever-changing. Are bots getting more sophisticated? How so?

Ido: Yes, bots have grown in sophistication over time, and attacks that used to happen only on the world’s largest websites are now happening on smaller, popular websites such as (Read more...)

*** This is a Security Bloggers Network syndicated blog from PerimeterX Blog authored by PerimeterX Blog. Read the original post at:

Techstrong Group