Archive Search Articles

How does a WAF mitigate vulnerabilities?

by: Lori MacVittie

In our forthcoming State of Application Delivery 2018 report, we note that the use of web application firewalls (WAF) has been steadily increasing for years. That’s a good thing, because apps today are the gateway to customer and corporate data...

Another Year of re:Invent, Another Year of Advances for F5 on AWS

by: Chad Whalen

F5's Chad Whalen reflects on the significant advancements F5 has made with AWS following an amazing week at AWS re:Invent.

The Risks of Running HTTP are Increasing but Manageable

by: Lori MacVittie

Whether we like it or not, HTTP is the de facto application transport protocol of the modern age. We use it everywhere. It’s as ubiquitous as IP and TCP, and serves much the same purpose. Its only goal is to transport the digital gold of today’s...

Why CVEs Should Be Given Priority One for Resolution

by: Lori MacVittie

When considering vulnerabilities, remember application security is a stack. You may have heard me say this before, but sometimes we need a reminder that modern applications are never deployed alone.

Where does a WAF fit in the data path?

by: Lori MacVittie

The data path contains multiple insertion points at which a WAF can be deployed. But that doesn’t mean every insertion point is a good idea.

How F5’s WAF Earned its AWS Security Competency

by: Tom Atkins

F5's Tom Atkins takes a closer look at the company's recently achieved AWS milestone, supporting those aiming to mitigate attacks on applications deployed in the public cloud.

Example-driven Insecurity Illustrates Need for WAF

by: Lori MacVittie

Learning online is big. Especially for those who self-identify as a developer. If you take a peek at Stack Overflow’s annual developer survey...

Bots are the Bane of Turing Security Test

by: Lori MacVittie

Bots are cool. Bots are scary. Bots are the future. Bots are getting smarter every day. Depending on what kind of bot we’re talking about, we’re either frustrated or fascinated by them.

Vulnerable Stuff Running in Containers Still Vulnerable Stuff

by: Lori MacVittie

It has been said – and not just by me – that encrypted malicious code is still malicious code. The encryption does nothing to change that...