
Protecting your identity.
Hacking Humans
00:00
Application Layer Defenses
So when we think about application layer defenses, you often hear the term lateral movement. So I'm rate limiting looking at those suspicious spikes that come into two systems and identity facing systems. And so really implementing controls there. Also suspicious IP blocking. Bots are really becoming one of the biggest adversaries they allow for the attackers to launch loads of attacks against consumer facing systems. We're always looking at IP addresses to help us to understand how we can leverage blocking to block suspicious IPs and really protect the consumer.
Play episode from 34:35
Transcript


