Archive Search Articles

How IoT can compromise network integrity

by: Bernd Kunze

The IoT (Internet of Things) is shaking up the networking space and paving the way for machine-to-machine (M2M) communication and automated processes.

Incredible security content at F5’s ANTICIPATE 2018 event

by: David Holmes

“Guys, did you hear? The team in ASEAN is building a security conference to rival the best in business. They call it ANTICIPATE!” That’s the rumor going around the F5 world and its true. We’re aiming high in Singapore to build a world-class...

BIG-IP Cloud Edition: Per-app Security and Scale

by: Lori MacVittie

There is a new network coming to a data center near you. And by ‘near you’ I mean within walking distance of your desk. Whether we like it or not, pressure from digital transformation continues to drive development of new apps at a frantic pace....

Per-App Architectures Protect Apps at Home and in the Cloud

by: Lori MacVittie

The data center is being driven to change by digital transformation, with cloud, containers, and catastrophic breaches prompting this evolution sooner rather than later.

The Three AWS Web Application Firewall Managed Rules You Need to Deploy Now

by: Lori MacVittie

A mind-boggling number of applications reside in the cloud without any protection. No web app firewall. No identity or access control. Nothing. They’re just out there, open to attack. That’s a nightmare for business, and a dream come true for...

WhiteHat and F5 join forces to deliver total web app security

by: Frank Strobel

Firms of all sizes rely on web applications for just about everything. Unfortunately, attackers know this too.

What Makes a WAF Advanced?

by: Brian A. McHenry

As the threat landscape evolves, so must our security controls and countermeasures. The most advanced perimeter threats for data loss or exfiltration occur at the application layer...

Business as Usual, Making the CISO Smile

by: Mark Campbell

As organizations transform the business with new applications and automation, it usually means exposing these business applications to the Internet and all the dangers that come with it.

Advanced threats require advanced solutions

by: Ram Krishnan

Perspective from F5 SVP Ram Krishnan around digital transformation, and applications' role as both key business driver and high-value target.

There is no such thing as a non-critical app when it comes to security

by: Lori MacVittie

At Thermopylae, so the story goes, the Persians were able to defeat the Spartans by outflanking them thanks to a narrow goat path rather than the expected frontal assault.

Balancing Security and Performance with Web Application Firewalls

by: Lori MacVittie

Using a WAF you can parse, pull apart, twist, and modify content however you want. But just because you can, doesn’t mean you should.

Production Pain Points and the Application Services that Relieve Them

by: Lori MacVittie

Developers in a RisingStack survey cite performance, security, and deployment difficulties in production environments Not all security and performance is the result of ‘bad code’. Platforms and protocol implementations are more often than not...

The Hunt for IoT Exposes Targeting of Build Infrastructure

by: Lori MacVittie

The Hunt for IoT by our own F5 Labs threat researchers continues. Its latest report exposes not only an active search for vulnerable IoT devices, but the targeting of build infrastructure.

F5 Acquires Microsoft Gold Cloud Competency

by: Tom Atkins

Confidence in the public cloud is on the rise as the market and platforms mature, thanks in part to certification and competency validations from major providers.