Archive Search Articles

Three Things App Security is Not

by: Lori MacVittie

App security is a lot of things, but sometimes we need to stop and consider what it isn’t, particularly as the volume and frequency of applications developed and deployed to meet the insatiable demand continues to rise. 1. Not a high priority A...

Nearly Half of Orgs Hit by Smokescreen DDoS Attacks

by: Lori MacVittie

Information security is rife with military terminology. That’s unsurprising, given the abstract relationship between the opposing forces; one trying to attack while the other defends. Modern DDoS attacks are surprisingly simplistic, in strategy at...

RSA: Building an Application Security Ecosystem

by: Preston Hogue

At F5, we talk a lot about concepts like the changing threat landscape and the dissolving perimeter – that applications and user identities are increasingly the primary targets of malicious attacks because these are the new gateways to valuable...

When Things Attack, Turn to Cloud

by: Lori MacVittie

Cyber. Things. Security. DDoS. These are digital disruptions; the modern equivalent of enemies at the gate.

iSeries: Not Just a Better, Bigger, and Faster BIG-IP

by: Robert Haynes

With the launch of F5's BIG-IP iSeries, you get innovative new platforms that can adapt hardware capacity to match your workloads.

Making Sense of the Last Month of DDoS Attacks

by: David Holmes

In this piece, we’ll take a brief look at the impact of the unprecedented #DDoS attacks of September and October 2016 and provide guidance for those interested in improving their resiliency. Let’s celebrate that the Internet of Things has...

Security in the Cloud: The Business Perimeter

by: Lori MacVittie

When Leonidas of the Spartans found himself faced with the prospect of defending Sparta against the totally much bigger and meaner Persian army, he specifically chose the narrow pass at Thermopylae to do so. In the Battle of Stirling Bridge,...

The Next Generation of DDoS Protection is Hybrid

by: Lori MacVittie

The term hybrid, in technology, has come to mean composing some thing from two or more seemingly disparate things. Hybrid cloud, for example, brings together SaaS, IaaS, and on-premise as the basis for a new, diversified corporate computing...

Cloud: Centralizing Security for Decentralized Environments

by: Lori MacVittie

There’s a kind of repetitive cycle to everything (or so it seems in hindsight) in which changes in app architectures and usage spur the need for new technologies in the network. Technologies designed to address those challenges that impede the...

The Fastest DDoS Mitigation in the West

by: Jay Kelley

Companies of all sizes are bombarded daily by network attacks and breaches. One of the most basic, yet effective network attacks against organizations and their applications are distributed denial of service (DDoS) attacks. The onslaught of these enterprise-aimed attacks has even the most security conscious organizations questioning their application defenses.

The Attack You Can’t Stop in Your Application

by: Lori MacVittie

A wide variety of HTTP-based attacks can (and should) be prevented in your application. The OWASP Top 10 is a prime example of attack techniques that are both detectable and preventable from within any application. A plethora of tools including...

Do you want security “at your” or “as a” service?

by: Lori MacVittie

The world of cloud computing had, until recently, settled down into its primary pillars of SaaS, PaaS, and IaaS. But as cloud consumers continue to mature in their understanding and use of cloud we’re starting to see an increased interest in what...