Archive Search Articles

Digital transformation is the only way forward for the banking and financial organizations in Asia

by: Keii

DX for BFSI industry Summary blog from Analyst Communication in APCJ theater by Kei.

2020 Digital Horoscope

by: Kuna Nallappan

In foretelling the future of technology adoption and how it drives business transformation, this piece pays homage to astrology and envisions twelve key predictions to help define the new Asia digital economy.

iSeries: Not Just a Better, Bigger, and Faster BIG-IP

by: Robert Haynes

With the launch of F5's BIG-IP iSeries, you get innovative new platforms that can adapt hardware capacity to match your workloads.

Deploy a Turnkey, Enterprise-Class WAF in Azure

by: Robert Haynes

Cloud Infrastructure-as-a-Service has driven greater agility, reduced opportunity costs, and enabled businesses to concentrate on core concerns and deliver new digital services faster than ever before. At the same time, the threats to these...

Balancing Security, Agility, and Efficiency for Your Apps in the Cloud

by: Robert Haynes

Protecting your applications in the cloud against layer 7 attacks is an essential piece of any organization’s security strategy. The challenge lies in finding the right balance of strong security, operational efficiency,...

Enterprise-Grade Security for Your Cloud Apps

by: Robert Haynes

If you have HTTP applications in the cloud—any cloud—there is a reasonable chance they will be vulnerable. Applications and the protocols they run remain prime targets...

Authentication in Context: Add the Right Controls for Every User

by: Robert Haynes

Applications have escaped from the data center. Your business may have applications running in many different environments serving users who switch between locations and devices rapidly. As your infrastructure evolves to meet the challenges of...

Brand, Business, and Fraud

by: Lori MacVittie

The most significant data breaches in the last 15 years were a result of application vulnerabilities.

EMEA Phishing Patterns: Insights from the F5 SOC

by: Lori MacVittie

It’s no secret to those who engage in actual fishing (for real, live fish) that timing matters. Certain types of fish are more active and thus likely to be caught in the morning, others in the evening, and still others in the early afternoon. It...

F5 at Cisco Live 2016: Your apps are in the cloud; your services should be too!

by: Jezmynn Koh

Less than a week left before we head off to Cisco Live, Melbourne from 8 – 11 March 2016 and things are starting to get real! This year F5 is on a mission to help organisations migrate their applications to the cloud and secure their journey in a...

Identity theft: A threat more severe than you think

by: Kuna Nallappan

The financial services industry in Asia is one of the most heavily regulated sectors, and compliance is often touted as a form of security assurance. However, compliance is just a single aspect of security. Various regulations cover a wide range...

The Internet of (Increasingly Scary) Things

by: Lori MacVittie

There is a lot of FUD (Fear, Uncertainty, and Doubt) that gets attached to any emerging technology trend, particularly when it involves vast legions of consumers eager to participate. And while it’s easy enough to shrug off the paranoia that bots...

F5 SOC: Shutting Down Malicious Scripts in Real Time

by: Lori MacVittie

It’s only sort of true that people are the weakest link in the information security chain. The truly weakest link is the browser. That’s because the browser is one of those apps that no one really pays much attention too, likely because in most...

On Cloud Nine: Singapore’s journey to a Smart Nation

by: Kuna Nallappan

The Infocomm Development Authority (IDA) wants to make Singapore the world’s first Smart Nation, and this vision means connecting devices, things and people to provide better quality of life in an era of mobility, urban density, aging population...

Is SSL Smuggling Malware into your Business?

by: Gary Newe

We all know about SSL, that vital bit of cryptographical kit that protects our online communications. It protects communications between the web browsers we use and the servers where websites such as this one are hosted. You’ll recognise a secure...