Archive Search Articles Bot Defense Should be a Key Component of a Proactive Security Strategy by: Lori MacVittie Usually when we talk about app protection we immediately focus on web application firewalls. Specifically, we tend to focus on the OWASP Top Ten and application layer vulnerabilities that can lead to becoming just another security statistic. ... There is no such thing as a non-critical app when it comes to security by: Lori MacVittie At Thermopylae, so the story goes, the Persians were able to defeat the Spartans by outflanking them thanks to a narrow goat path rather than the expected frontal assault. F5 Year In Review by: Drew Milam As December brings 2017 to a close, it also marks an opportunity to be retrospective and look back on the year that was. This past month, we’ve been highlighting some of our blog posts, security research, reports, F5 Labs threat intelligence, and... How does a WAF mitigate vulnerabilities? by: Lori MacVittie In our forthcoming State of Application Delivery 2018 report, we note that the use of web application firewalls (WAF) has been steadily increasing for years. That’s a good thing, because apps today are the gateway to customer and corporate data... F5 Achieves AWS Networking Competency by: David Helfer The BIG-IP Virtual Edition showcased its ability to ensure performance, availability, and security for business-critical applications hosted within the AWS cloud. Combat Commodified Attacks with Managed Security Services by: Lee Slaughter Anyone with access to a computer can point a DDoS-for-hire push button tool anywhere they want for just a few bucks. The sophistication is low and the accessibility is high, meaning the frequency of these attacks is primed to increase. Bots are the Bane of Turing Security Test by: Lori MacVittie Bots are cool. Bots are scary. Bots are the future. Bots are getting smarter every day. Depending on what kind of bot we’re talking about, we’re either frustrated or fascinated by them. Three Things App Security is Not by: Lori MacVittie App security is a lot of things, but sometimes we need to stop and consider what it isn’t, particularly as the volume and frequency of applications developed and deployed to meet the insatiable demand continues to rise. 1. Not a high priority A... Securing the New Perimeter by: Ryan Kearny Applications today are everywhere, crossing boundaries between personal and professional, mobile and desktop, the data center and the cloud. Multiplying applications means multiplying risks.