Archive Search Articles

Per-App Architectures Protect Apps at Home and in the Cloud

by: Lori MacVittie

The data center is being driven to change by digital transformation, with cloud, containers, and catastrophic breaches prompting this evolution sooner rather than later.

The Three AWS Web Application Firewall Managed Rules You Need to Deploy Now

by: Lori MacVittie

A mind-boggling number of applications reside in the cloud without any protection. No web app firewall. No identity or access control. Nothing. They’re just out there, open to attack. That’s a nightmare for business, and a dream come true for...

WhiteHat and F5 join forces to deliver total web app security

by: Frank Strobel

Firms of all sizes rely on web applications for just about everything. Unfortunately, attackers know this too.

What Makes a WAF Advanced?

by: Brian A. McHenry

As the threat landscape evolves, so must our security controls and countermeasures. The most advanced perimeter threats for data loss or exfiltration occur at the application layer...

Business as Usual, Making the CISO Smile

by: Mark Campbell

As organizations transform the business with new applications and automation, it usually means exposing these business applications to the Internet and all the dangers that come with it.

Advanced threats require advanced solutions

by: Ram Krishnan

Perspective from F5 SVP Ram Krishnan around digital transformation, and applications' role as both key business driver and high-value target.

There is no such thing as a non-critical app when it comes to security

by: Lori MacVittie

At Thermopylae, so the story goes, the Persians were able to defeat the Spartans by outflanking them thanks to a narrow goat path rather than the expected frontal assault.

Balancing Security and Performance with Web Application Firewalls

by: Lori MacVittie

Using a WAF you can parse, pull apart, twist, and modify content however you want. But just because you can, doesn’t mean you should.

Production Pain Points and the Application Services that Relieve Them

by: Lori MacVittie

Developers in a RisingStack survey cite performance, security, and deployment difficulties in production environments Not all security and performance is the result of ‘bad code’. Platforms and protocol implementations are more often than not...

The Hunt for IoT Exposes Targeting of Build Infrastructure

by: Lori MacVittie

The Hunt for IoT by our own F5 Labs threat researchers continues. Its latest report exposes not only an active search for vulnerable IoT devices, but the targeting of build infrastructure.

F5 Acquires Microsoft Gold Cloud Competency

by: Tom Atkins

Confidence in the public cloud is on the rise as the market and platforms mature, thanks in part to certification and competency validations from major providers.

Announcing F5 Managed Rulesets for AWS WAF

by: Andrew Hendry

AWS has just announced enhanced F5 managed security capabilities on AWS WAF around Bot Protection, CVE Vulnerabilities, and Web Exploits.

Application Services Update: Security, Speed, and Suspicious Visitors

by: Lori MacVittie

It’s time again to dig into the application services organizations are actually using to make apps faster and safer. Of note is a rise in use of bot defense services and the slow but steady inroads being made by HTTP/2. While not an application...

Don’t take your eye off GTP en route to 5G

by: Peter Nas

Changes to the EU’s roaming regulations and raised awareness of security risks are fueling dramatic increases in GPRS Tunneling Protocol (GTP) traffic.