Archive Search Articles

Managing Digital Certs: Making the Essential Less Annoying

by: Dan Schrader

F5's Dan Schrader highlights how BIG-IQ makes SSL certificate management (and your life) a bit easier.

Open Source Spotlight: F5 Infrastructure as Code and Multi-Cloud Manageability

by: Lori MacVittie

You might have noted that a significant drum beat under the multi-cloud mantra is manageability. That’s because the task of scaling, securing, and delivering apps to users requires a certain set of services – load balancers, compute, storage, app...

The Risks of Running HTTP are Increasing but Manageable

by: Lori MacVittie

Whether we like it or not, HTTP is the de facto application transport protocol of the modern age. We use it everywhere. It’s as ubiquitous as IP and TCP, and serves much the same purpose. Its only goal is to transport the digital gold of today’s...

Combat Commodified Attacks with Managed Security Services

by: Lee Slaughter

Anyone with access to a computer can point a DDoS-for-hire push button tool anywhere they want for just a few bucks. The sophistication is low and the accessibility is high, meaning the frequency of these attacks is primed to increase.

Why CVEs Should Be Given Priority One for Resolution

by: Lori MacVittie

When considering vulnerabilities, remember application security is a stack. You may have heard me say this before, but sometimes we need a reminder that modern applications are never deployed alone.

Scary Candy Week: KRACK and ROCA

by: David Holmes

What You Need to Know and What You Need to Do – It’s not a coincidence that Halloween falls in October. We humans have a heightened fear perception this time of year; it’s some kind of vestigial response to the shortening of days.

Where does a WAF fit in the data path?

by: Lori MacVittie

The data path contains multiple insertion points at which a WAF can be deployed. But that doesn’t mean every insertion point is a good idea.

How F5’s WAF Earned its AWS Security Competency

by: Tom Atkins

F5's Tom Atkins takes a closer look at the company's recently achieved AWS milestone, supporting those aiming to mitigate attacks on applications deployed in the public cloud.

Dear NetOps: Security Rule Zero Applies to You, Too

by: Lori MacVittie

Okay, NetOps. As you’re getting all automated up and scripting your hearts out, it’s time for a gentle reminder about security. I’m not talking about firewalls and WAF or other security services you may be responsible for.

Taking Customers to AWS, Through Our Channel

by: David Helfer

SVP of Worldwide Channels David Helfer highlights F5's selection for the AWS Channel Opportunity Registration Program and just-achieved AWS Security Competency.

Example-driven Insecurity Illustrates Need for WAF

by: Lori MacVittie

Learning online is big. Especially for those who self-identify as a developer. If you take a peek at Stack Overflow’s annual developer survey...

Making Multi-Cloud Manageable: F5 Application Connector Now Available for Microsoft Azure

by: Lori MacVittie

When using multiple public clouds to host applications, you’ve still got to manage those apps and connect them to a secure inbound path.

Bots are the Bane of Turing Security Test

by: Lori MacVittie

Bots are cool. Bots are scary. Bots are the future. Bots are getting smarter every day. Depending on what kind of bot we’re talking about, we’re either frustrated or fascinated by them.

Ceding Control of IoT for the Sake of Security

by: Lori MacVittie

We are, I think it’s safe to say, universally delighted by technology. The mundane is transformed into the magical by the mere introduction of technology. The novelty wears off after a time, of course, but by then there’s some other task that has...

Vulnerable Stuff Running in Containers Still Vulnerable Stuff

by: Lori MacVittie

It has been said – and not just by me – that encrypted malicious code is still malicious code. The encryption does nothing to change that...