Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

8 - Advanced

In this session, we will dive into the advanced usage of Zaraz. We will cover how you can use Zaraz to run data transformation/enrichment on the Edge using Workers Variables. Additionally, we will discuss the HTTP request tool and how you can use it for ETL/monitoring/marketing automation. Lastly, we will cover Zaraz's HTTP Events API, which lets you send data to Zaraz from any potential source over HTTP.

9 - Testing & Debugging

In this session, we will dive into the advanced usage of Zaraz. We will cover how you can use Zaraz to run data transformation/enrichment on the Edge using Workers Variables. Additionally, we will discuss the HTTP request tool and how you can use it for ETL/monitoring/marketing automation. Lastly, we will cover Zaraz's HTTP Events API, which lets you send data to Zaraz from any potential source over HTTP.

DDoS threat report for 2023 Q1

Welcome to the first DDoS threat report of 2023. DDoS attacks, or distributed denial-of-service attacks, are a type of cyber attack that aim to overwhelm Internet services such as websites with more traffic than they can handle, in order to disrupt them and make them unavailable to legitimate users. In this report, we cover the latest insights and trends about the DDoS attack landscape as we observed across our global network.