API Attacks Up 113%, DDoS at Record Highs: Akamai’s Steve Winterfeld on the 2025 Threat Landscape | TFiR Akamai Advisory CISO Steve Winterfeld breaks down the 2025 SOTI security research report — API attacks up ... By Monika Chauhan3 days ago Security
Trusted Developer Tools Are Now Malware Delivery Systems: ThreatDown’s Marco Giuliani on the Deno Runtime Attack ThreatDown VP of Research Marco Giuliani breaks down the first Deno-based fileless malware attack — steganography-hidden payloads, ... By Monika ChauhanApril 29, 2026 Security
API Attacks Surge 113% as Attackers Shift to Coordinated Multi-Vector Campaigns | Steve Winterfeld, Akamai Attackers are combining API abuse, web exploits, and DDoS into coordinated industrial-scale campaigns. Akamai's Steve Winterfeld explains ... By Monika ChauhanApril 22, 2026 Security
Why Security Standards Lag Behind Threats—And How to Stay Ahead | Steve Winterfeld, Akamai | TFiR Security standards move slower than threats. By the time OWASP or NIST publish guidance, attackers have ... By Monika ChauhanMarch 24, 2026 Security
Why Security Leaders Should Plagiarize Compliance Frameworks | Steve Winterfeld, Akamai | TFiR Security compliance doesn't have to be boring or bureaucratic. Steve Winterfeld, Advisory CISO at Akamai, explains ... By Monika ChauhanMarch 20, 2026 Security
OWASP Updated Their Top 10 Again—Here’s What Security Leaders Need to Know | Steve Winterfeld, Akamai | TFiR OWASP lists aren't static. The Web Application Top 10 added software supply chain vulnerabilities. LLMs updated after ... By Monika ChauhanMarch 13, 2026 Security
Why Static Code Scanners Fail at Runtime—And What Security Leaders Should Do | Joe Sullivan, Joe Sullivan Security | TFiR AI coding assistants are shipping code faster than ever. But static scanners can't catch what breaks in ... By Monika ChauhanMarch 13, 2026 Security
How Enterprises Stop Breaches with Automated Attack Surface Management Modern enterprises are drowning in complexity. Chris Wallis, Founder and CEO of Intruder, explains how automated attack ... By Monika ChauhanMarch 10, 2026 Security
Jeremy Allison on Why Post-Quantum Cryptography Can’t Wait | CIQ Adversaries are harvesting encrypted data today to decrypt when quantum computers arrive. Jeremy Allison of CIQ discusses ... By Monika ChauhanMarch 2, 2026 Security
Akamai’s Advisory CISO on Why OWASP’s Top 10 Lists Are a Security Team’s Best ROI Akamai's Steve Winterfeld breaks down how OWASP's Top 10 vulnerability lists help security teams maximize ROI — ... By Monika ChauhanFebruary 25, 2026 Security