Blog

Blog posts

  • Understanding the Humans Behind the Bots

    So, what is a bot anyway? Personally, I think it’s an overused, often misunderstood and mostly useless term.

  • How to get Fast Incident Response

    ‘Tis the season to be attacked, and time is of the essence. Especially during the festive period, it's critical to have a fast incident response to shut down attacks as quickly as possible.

  • Ho ho ho, No! Identifying the Signals of a Festive Fraud Attack

    Web security and analytics tools provide limited visibility of fraudulent activity. These attacks fall into a ‘grey area’.

  • Mastery of the puppets – advanced bot detection

    A critical part of Kasada’s product development and R&D process involves building bots to stress test our platform.

  • I Spy

    Malicious automation has enabled hackers to launch sophisticated attacks that easily evade the detection of static security tools such as Web Application firewalls.

  • BYO Content Distribution Network (CDN)

    Conventional web application security (WAF) relies on complex HTTP request analysis and the over-provision of expensive bandwidth.

Knowledge and expertise creates protection that evolves