Archive Search Articles

Hoisted by Our Own Petards: Big Dirty Data

by: Lori MacVittie

Big data. Petabytes generated on an hourly basis for millions of sensors and monitors embedded in things across the business value chain. From manufacturing to delivery, from POS to consumers, data is being generated in unprecedented amounts. ...

Programmable Proxies are the Duct Tape of the Internet

by: Lori MacVittie

Programmable proxies protect ports from predators – like those targeting SMB today.   When the Internet was in its infancy, my oldest three children were teenagers. Even then – with a far smaller Internet - unfettered access was not...

Was DC25 My Last DEF CON?

by: David Holmes

F5's David Holmes looks back at the recently concluded DC25 and ponders future attendance.

Cloud Needs Operational Gates–Especially for Security

by: Lori MacVittie

In January of 2017, the very popular MongoDB suffered what seems to be becoming a fairly predictable tactic for attackers: taking data hostage. Subsequent investigation noted that for the most part, attackers had exploited … nothing.

Realizing FIPS Validation in Virtualized, SDN, and Cloud Data Centers

by: Henry Tam

Securing your data and infrastructure while transitioning to cloud (and software-defined everything) is complicated, but throw in tighter, stricter regulatory compliance and then you really have complexity and risk.

Black Hat at 20 – A Quick Recap

by: David Holmes

F5's principal threat research evangelist puts on his reporter hat to bring you some insights from one of the oldest hacker conferences there is.

Container Danger in the Cloud

by: Lori MacVittie

The slow but steady migration to cloud-based environments has had an impact on many aspects of IT. One we rarely make mention of is administration. But we should.

Is 2017 Half Empty or Half Full?

by: Peter Silva

F5 DevCentral's Pete Silva takes a look at tech trends thus far in 2017, with ransomeware (still) top-of-mind.

Rethink Your Access Strategy, Think BeyondCorp

by: Lee Slaughter

F5's Lee Slaughter offers his take on the 'zero trust' model, along with solutions from F5 and Google.

Stop the IoT attack that comes before THE ATTACK

by: Lori MacVittie

Generally speaking, the use of the term “attack” has come to mean an attempt to deny service to an organization. That’s likely because the frequency and volume of DDoS attacks have had serious consequences for high-profile organizations. The...

Top Security Findings in the F5 State of Application Delivery Report

by: David Holmes

Nearly one in five of report respondents have security titles. F5's David Holmes takes a closer look at what's important to them.

Three Things App Security is Not

by: Lori MacVittie

App security is a lot of things, but sometimes we need to stop and consider what it isn’t, particularly as the volume and frequency of applications developed and deployed to meet the insatiable demand continues to rise. 1. Not a high priority A...

Are your business apps a cause for concern?

by: Shahnawaz Backer

Commentary from F5's Shahnawaz Backer on Asia Pacific’s rise in global fintech investments, along with the related security considerations.