Archive Search Articles

Bot Defense Should be a Key Component of a Proactive Security Strategy

by: Lori MacVittie

Usually when we talk about app protection we immediately focus on web application firewalls. Specifically, we tend to focus on the OWASP Top Ten and application layer vulnerabilities that can lead to becoming just another security statistic. ...

Application Services Update: More than 4 in 5 use SSL Termination

by: Lori MacVittie

It’s time again to dig into the application services organizations are actually using to make apps faster and safer. Of note this quarter again is a continuing rise in use of bot defense services. Security application services in general all made...

The Surprising Truth about Digital Transformation and What It’s Doing to Your Network

by: Lori MacVittie

It’s not really that technology is changing all that much, it’s more the fact that how we engage with technology is rapidly changing.

F5 Anti-Bot Mobile SDK Extends Bot Protection to Mobile Apps

by: Byron McNaught

Byron McNaught looks at the ways back-end mobile API components can be exposed to automated attacks such as content scraping, denial of service, and a wave of other new threats (and what you can do about it).

F5: An Initial Launch Member of Microsoft’s Intelligent Security Association

by: Tom Atkins

The security of applications, data, and networking infrastructure is now more critical than ever, given the continued evolution of cyberattack vectors and the frequency at which they occur. It is predicted that by 2021 cyber-crime will cost...

How IoT can compromise network integrity

by: Bernd Kunze

The IoT (Internet of Things) is shaking up the networking space and paving the way for machine-to-machine (M2M) communication and automated processes.

Incredible security content at F5’s ANTICIPATE 2018 event

by: David Holmes

“Guys, did you hear? The team in ASEAN is building a security conference to rival the best in business. They call it ANTICIPATE!” That’s the rumor going around the F5 world and its true. We’re aiming high in Singapore to build a world-class...

BIG-IP Cloud Edition: Per-app Security and Scale

by: Lori MacVittie

There is a new network coming to a data center near you. And by ‘near you’ I mean within walking distance of your desk. Whether we like it or not, pressure from digital transformation continues to drive development of new apps at a frantic pace....

Per-App Architectures Protect Apps at Home and in the Cloud

by: Lori MacVittie

The data center is being driven to change by digital transformation, with cloud, containers, and catastrophic breaches prompting this evolution sooner rather than later.

The Three AWS Web Application Firewall Managed Rules You Need to Deploy Now

by: Lori MacVittie

A mind-boggling number of applications reside in the cloud without any protection. No web app firewall. No identity or access control. Nothing. They’re just out there, open to attack. That’s a nightmare for business, and a dream come true for...

WhiteHat and F5 join forces to deliver total web app security

by: Frank Strobel

Firms of all sizes rely on web applications for just about everything. Unfortunately, attackers know this too.

What Makes a WAF Advanced?

by: Brian A. McHenry

As the threat landscape evolves, so must our security controls and countermeasures. The most advanced perimeter threats for data loss or exfiltration occur at the application layer...

Business as Usual, Making the CISO Smile

by: Mark Campbell

As organizations transform the business with new applications and automation, it usually means exposing these business applications to the Internet and all the dangers that come with it.

Advanced threats require advanced solutions

by: Ram Krishnan

Perspective from F5 SVP Ram Krishnan around digital transformation, and applications' role as both key business driver and high-value target.