Archive Search Articles

Don’t take your eye off GTP en route to 5G

by: Peter Nas

Changes to the EU’s roaming regulations and raised awareness of security risks are fueling dramatic increases in GPRS Tunneling Protocol (GTP) traffic.

Conquering video: Overcoming the congestion conundrum

by: Raffaele D'Albenzio

F5 technology offers a cost-effective solution to the challenge of video by improving the way Transmission Control Protocol (TCP) works on the mobile network.

Unlocking smart core network slicing for IoT and MVNOs

by: Bart Salaets

Network slicing is one of the most important 5G innovations available to mobile operators, allowing them to subdivide one physical network into multiple logical networks.

State of Application Delivery 2018: Application Services are the Gateway to a Digital Future

by: Lori MacVittie

The primary purpose for our State of Application Delivery research is to understand the current – and predict the future – state of application delivery around the world. That means a focus on application services. These are the broad set...

The State of Application Delivery 2018: Digital Transformation Driving Automation and Multi-Cloud Despite Security Concerns

by: Lori MacVittie

Discover the key findings of F5's fourth annual State of Application Delivery report.

Welcome to 2018: Apps Under Siege

by: Lori MacVittie

Apps are the strategy upon which business has staked its digital survival, and F5 Labs research shows they will remain under siege in 2018. This year, let’s resolve to be vigilant in their protection, no matter whether they lie over hill in the...

Security Rule One: You’re probably violating it right now

by: Lori MacVittie

By now you’ve heard Security Rule Zero enough to know it by heart. You do know it by heart, right? Just in case, let me refresh your memory: THOU SHALT NOT TRUST USER INPUT. EVER. Excellent. Now that we’ve got that fundamental rule established...

Security Rule Zero: A Warning about X-Forwarded-For

by: Lori MacVittie

Proxies operate on the premise that they exist to forward requests from one system to another. They generally add some value like load balancing (scale), data leak prevention (security), or compression (performance).

Container Danger in the Cloud

by: Lori MacVittie

The slow but steady migration to cloud-based environments has had an impact on many aspects of IT. One we rarely make mention of is administration. But we should.

Rethink Your Access Strategy, Think BeyondCorp

by: Lee Slaughter

F5's Lee Slaughter offers his take on the 'zero trust' model, along with solutions from F5 and Google.

Possession and Identity in the Internet of Things

by: Lori MacVittie

Long-time tech watchers have seen the gradual move of computing devices from no-user to multi-user to single-user models.

The Gateways to Innovation are in the Network

by: Lori MacVittie

Throughout history, certain places have been anointed with the term “gateway to the _____.” These locations are famous for being strategically important for the defense of a kingdom or as a pathway to new opportunities.

Hello IoT, Goodbye Security Innocence

by: Bernd Kunze

2016 showed us that the Internet of Things (IoT) is a game-changer when it comes to service provider networks.

RSA: Building an Application Security Ecosystem

by: Preston Hogue

At F5, we talk a lot about concepts like the changing threat landscape and the dissolving perimeter – that applications and user identities are increasingly the primary targets of malicious attacks because these are the new gateways to valuable...

Credential Theft: Easy as Shooting Phish in a Barrel

by: Lee Slaughter

Imagine your best-case scenario: You’ve conducted security awareness training for your users and have educated them on all the threats that apply to them. You’ve cultivated a culture of security where everyone knows the tactics of phishers...