Archive Search Articles

There is no such thing as a non-critical app when it comes to security

by: Lori MacVittie

At Thermopylae, so the story goes, the Persians were able to defeat the Spartans by outflanking them thanks to a narrow goat path rather than the expected frontal assault.

Balancing Security and Performance with Web Application Firewalls

by: Lori MacVittie

Using a WAF you can parse, pull apart, twist, and modify content however you want. But just because you can, doesn’t mean you should.

Production Pain Points and the Application Services that Relieve Them

by: Lori MacVittie

Developers in a RisingStack survey cite performance, security, and deployment difficulties in production environments Not all security and performance is the result of ‘bad code’. Platforms and protocol implementations are more often than not...

The Hunt for IoT Exposes Targeting of Build Infrastructure

by: Lori MacVittie

The Hunt for IoT by our own F5 Labs threat researchers continues. Its latest report exposes not only an active search for vulnerable IoT devices, but the targeting of build infrastructure.

F5 Acquires Microsoft Gold Cloud Competency

by: Tom Atkins

Confidence in the public cloud is on the rise as the market and platforms mature, thanks in part to certification and competency validations from major providers.

Announcing F5 Managed Rulesets for AWS WAF

by: Andrew Hendry

AWS has just announced enhanced F5 managed security capabilities on AWS WAF around Bot Protection, CVE Vulnerabilities, and Web Exploits.

Application Services Update: Security, Speed, and Suspicious Visitors

by: Lori MacVittie

It’s time again to dig into the application services organizations are actually using to make apps faster and safer. Of note is a rise in use of bot defense services and the slow but steady inroads being made by HTTP/2. While not an application...

Don’t take your eye off GTP en route to 5G

by: Peter Nas

Changes to the EU’s roaming regulations and raised awareness of security risks are fueling dramatic increases in GPRS Tunneling Protocol (GTP) traffic.

Three Signs of an App Attack Developers Should Know

by: Lori MacVittie

Apps are under siege. Attacks occur with alarming frequency – every 39 seconds according to research conducted by the University of Maryland

State of Application Delivery 2018: Security in the cloud, yes! Confidence, not so much.

by: Lori MacVittie

Digital transformation is a forcing function, encouraging automation and orchestration across IT and driving organizations to the decision to deliver apps from the public cloud. In fact, digital transformation permeates so thoroughly across IT...

State of Application Delivery 2018: Application Services are the Gateway to a Digital Future

by: Lori MacVittie

The primary purpose for our State of Application Delivery research is to understand the current – and predict the future – state of application delivery around the world. That means a focus on application services. These are the broad set...

Is DevOps ‘Build to Fail’ Philosophy a Security Risk?

by: Lori MacVittie

Breaking Betteridge’s Law of Headlines, the short answer is yes. But as all things today involving technology, the long answer is a bit more involved than that. DevOps has become, I think, fairly pervasive across all industries. While not...

State of Application Delivery 2018: Digital Transformation Changes Everything

by: Lori MacVittie

Digital transformation (DX) is a slippery term to define. As with cloud years ago and more recently, DevOps, the term is treated like silly putty in the hands of whomever uses it.

The State of Application Delivery 2018: Digital Transformation Driving Automation and Multi-Cloud Despite Security Concerns

by: Lori MacVittie

Discover the key findings of F5's fourth annual State of Application Delivery report.

Four Years in Review: What’s Changed in the State of Application Delivery

by: Cindy Borovick

With our 4th annual SOAD report published, we look back and share how the market has evolved, and what we have learned.