Archive Search Articles

Identity Federation and SSO for Microsoft and F5 Customers

by: Mark Campbell

Buiding on our momentum from Microsoft Ignite in September, there is cause for merriment for those of you using Microsoft Active Directory Federation Services (AD FS). I am sensing disbelief, but read on, I promise the is joy afoot....

Welcome to 2018: Apps Under Siege

by: Lori MacVittie

Apps are the strategy upon which business has staked its digital survival, and F5 Labs research shows they will remain under siege in 2018. This year, let’s resolve to be vigilant in their protection, no matter whether they lie over hill in the...

F5 Year In Review

by: Drew Milam

As December brings 2017 to a close, it also marks an opportunity to be retrospective and look back on the year that was. This past month, we’ve been highlighting some of our blog posts, security research, reports, F5 Labs threat intelligence, and...

Five Predictions for 2018 You Can Pretty Much Bank On

by: Lori MacVittie

Lori MacVittie decided to put down in digital ink what the data and technology cycle is showing will be pretty much a given in 2018.

How does a WAF mitigate vulnerabilities?

by: Lori MacVittie

In our forthcoming State of Application Delivery 2018 report, we note that the use of web application firewalls (WAF) has been steadily increasing for years. That’s a good thing, because apps today are the gateway to customer and corporate data...

The Top 10, Top 10 Predictions for 2018

by: Peter Silva

Peter Silva looks into the crystal balls of IT industry pundits and compiles a list of annual predictions for the coming year.

Another Year of re:Invent, Another Year of Advances for F5 on AWS

by: Chad Whalen

F5's Chad Whalen reflects on the significant advancements F5 has made with AWS following an amazing week at AWS re:Invent.

Security Rule One: You’re probably violating it right now

by: Lori MacVittie

By now you’ve heard Security Rule Zero enough to know it by heart. You do know it by heart, right? Just in case, let me refresh your memory: THOU SHALT NOT TRUST USER INPUT. EVER. Excellent. Now that we’ve got that fundamental rule established...

Security Rule Zero: A Warning about X-Forwarded-For

by: Lori MacVittie

Proxies operate on the premise that they exist to forward requests from one system to another. They generally add some value like load balancing (scale), data leak prevention (security), or compression (performance).

F5 Achieves AWS Networking Competency

by: David Helfer

The BIG-IP Virtual Edition showcased its ability to ensure performance, availability, and security for business-critical applications hosted within the AWS cloud.

HTTP Rising: Telemetry, Tracking, and Terror in Container Environs

by: Lori MacVittie

HTTP is ubiquitous. If a device has networking capabilities, it probably speaks HTTP as fluently as you speak your native language.

Cloud Can’t Protect You Against Yourself

by: Lori MacVittie

Cloud security. The term itself is actually meaningless without qualification. Do you mean the security of the underlying infrastructure that makes up “cloud”? Or perhaps of command and control APIs that let you provision and manage compute,...

Managing Digital Certs: Making the Essential Less Annoying

by: Dan Schrader

F5's Dan Schrader highlights how BIG-IQ makes SSL certificate management (and your life) a bit easier.

Open Source Spotlight: F5 Infrastructure as Code and Multi-Cloud Manageability

by: Lori MacVittie

You might have noted that a significant drum beat under the multi-cloud mantra is manageability. That’s because the task of scaling, securing, and delivering apps to users requires a certain set of services – load balancers, compute, storage, app...

The Risks of Running HTTP are Increasing but Manageable

by: Lori MacVittie

Whether we like it or not, HTTP is the de facto application transport protocol of the modern age. We use it everywhere. It’s as ubiquitous as IP and TCP, and serves much the same purpose. Its only goal is to transport the digital gold of today’s...