Archive Search Articles

HTTP Rising: Telemetry, Tracking, and Terror in Container Environs

by: Lori MacVittie

HTTP is ubiquitous. If a device has networking capabilities, it probably speaks HTTP as fluently as you speak your native language.

Cloud Can’t Protect You Against Yourself

by: Lori MacVittie

Cloud security. The term itself is actually meaningless without qualification. Do you mean the security of the underlying infrastructure that makes up “cloud”? Or perhaps of command and control APIs that let you provision and manage compute,...

How to Win at Multi-Cloud: Standardize then Automate to Innovate

by: Lori MacVittie

Cloud has always been about realizing economies of scale. With digital transformation driving organizations to seek new opportunities to improve productivity (internal) and profit (external) with applications, the rate at which operations and apps...

Managing Digital Certs: Making the Essential Less Annoying

by: Dan Schrader

F5's Dan Schrader highlights how BIG-IQ makes SSL certificate management (and your life) a bit easier.

Open Source Spotlight: F5 Infrastructure as Code and Multi-Cloud Manageability

by: Lori MacVittie

You might have noted that a significant drum beat under the multi-cloud mantra is manageability. That’s because the task of scaling, securing, and delivering apps to users requires a certain set of services – load balancers, compute, storage, app...

Understanding the state of cloud journey in Asia Pacific

by: Keii

This year we hosted a series of Cloud focused events in the region and were fortunate to be able to connect with a number of customers. In this blog, I would like to summarize where those customers are, in terms of their Cloud shift, and wrap up...

Speed and Scale: F5 BIG-IP as Ingress control for Kubernetes

by: Lori MacVittie

There’s as much confusion as there is chaos in container land. Every day seems to bring some new capability or component to the world of container orchestration environments. That’s necessary, because it’s still maturing as use of containers...

The Risks of Running HTTP are Increasing but Manageable

by: Lori MacVittie

Whether we like it or not, HTTP is the de facto application transport protocol of the modern age. We use it everywhere. It’s as ubiquitous as IP and TCP, and serves much the same purpose. Its only goal is to transport the digital gold of today’s...

Combat Commodified Attacks with Managed Security Services

by: Lee Slaughter

Anyone with access to a computer can point a DDoS-for-hire push button tool anywhere they want for just a few bucks. The sophistication is low and the accessibility is high, meaning the frequency of these attacks is primed to increase.

The New OSI Network Stack: Containers and Half-Layers

by: Lori MacVittie

Back in 1983, a group of like-minded folks in the computer and telecom industries got together to create a detailed specification they called the Open Systems Interconnection (OSI).

Open Source Spotlight: OpenStack LBaaS Enhanced Service Definitions

by: Lori MacVittie

One of the often mentioned benefits of cloud – private or public, on-prem or off – is speed. Speed to provision, speed to scale, speed to ultimately get an app delivered to the users who desire or demand its functionality. To get that speed, much...

Automation, Clouds, and Continuous Delivery: Learning What to Learn

by: Robert Haynes

F5's Robert Haynes gives a quick run-down of automation topics to consider (and where to start).

Why CVEs Should Be Given Priority One for Resolution

by: Lori MacVittie

When considering vulnerabilities, remember application security is a stack. You may have heard me say this before, but sometimes we need a reminder that modern applications are never deployed alone.

Scary Candy Week: KRACK and ROCA

by: David Holmes

What You Need to Know and What You Need to Do – It’s not a coincidence that Halloween falls in October. We humans have a heightened fear perception this time of year; it’s some kind of vestigial response to the shortening of days.

Where does a WAF fit in the data path?

by: Lori MacVittie

The data path contains multiple insertion points at which a WAF can be deployed. But that doesn’t mean every insertion point is a good idea.