Archive Search Articles

Bot Defense Should be a Key Component of a Proactive Security Strategy

by: Lori MacVittie

Usually when we talk about app protection we immediately focus on web application firewalls. Specifically, we tend to focus on the OWASP Top Ten and application layer vulnerabilities that can lead to becoming just another security statistic. ...

There is no such thing as a non-critical app when it comes to security

by: Lori MacVittie

At Thermopylae, so the story goes, the Persians were able to defeat the Spartans by outflanking them thanks to a narrow goat path rather than the expected frontal assault.

F5 Year In Review

by: Drew Milam

As December brings 2017 to a close, it also marks an opportunity to be retrospective and look back on the year that was. This past month, we’ve been highlighting some of our blog posts, security research, reports, F5 Labs threat intelligence, and...

How does a WAF mitigate vulnerabilities?

by: Lori MacVittie

In our forthcoming State of Application Delivery 2018 report, we note that the use of web application firewalls (WAF) has been steadily increasing for years. That’s a good thing, because apps today are the gateway to customer and corporate data...

F5 Achieves AWS Networking Competency

by: David Helfer

The BIG-IP Virtual Edition showcased its ability to ensure performance, availability, and security for business-critical applications hosted within the AWS cloud.

Combat Commodified Attacks with Managed Security Services

by: Lee Slaughter

Anyone with access to a computer can point a DDoS-for-hire push button tool anywhere they want for just a few bucks. The sophistication is low and the accessibility is high, meaning the frequency of these attacks is primed to increase.

Bots are the Bane of Turing Security Test

by: Lori MacVittie

Bots are cool. Bots are scary. Bots are the future. Bots are getting smarter every day. Depending on what kind of bot we’re talking about, we’re either frustrated or fascinated by them.

Three Things App Security is Not

by: Lori MacVittie

App security is a lot of things, but sometimes we need to stop and consider what it isn’t, particularly as the volume and frequency of applications developed and deployed to meet the insatiable demand continues to rise. 1. Not a high priority A...

Securing the New Perimeter

by: Ryan Kearny

Applications today are everywhere, crossing boundaries between personal and professional, mobile and desktop, the data center and the cloud. Multiplying applications means multiplying risks.