We are, I think it’s safe to say, universally delighted by technology. The mundane is transformed into the magical by the mere introduction of technology. The novelty wears off after a time, of...
There’s a lot of hype surrounding cryptocurrencies, but what’s good for currency traders may not be great for security-minded professionals.
As enterprises more closely align their security and IT operations, they still struggle to shift their security programs from reactive to proactive.
SINGAPORE – Today at Singapore International Cyber Week, F5 Networks (NASDAQ: FFIV) released a comprehensive report on the evolving nature of the CISO role and the IT security approaches...
It has been said – and not just by me – that encrypted malicious code is still malicious code. The encryption does nothing to change that...
The Ansible community requires everyone to be nice to each other, to be empathetic and to be kind. This is best evidenced by the Ansible Code of Conduct for events. One excerpt: “Ansible is...
As quickly as attackers commandeer IoT devices to build more “thingbots,” they continue to evolve their attack types and functionality.
Along with their just-opened San Jose data center, Equinix leverages F5 BIG-IP for application services to support multi-cloud interconnection.
F5 SVP Calvin Rowland walks you through the mindset of moving to the cloud, with a nod to just announced IBM/VMware/F5 solutions.
Over the past year, F5 and Ansible have been working hard to bring network automation solutions to our customers.
In successive releases, Ansible has introduced more and more network automation...
Don’t let anyone tell you hardware doesn’t matter. Hardware is everywhere. In every mobile phone. Every Fitbit and techno-gadget we own. In our cars. In our laptops and tablets. Increasingly, it’s...
Cloud adoption changes the way we deploy applications, and the way that IT fulfills its responsibility of “stopping everything breaking.”
If there’s anything hotter than containers right now, it’s probably something based on containers, like serverless. In addition to being the “cool” kid on the block right now, it’s also the focus...
In the beginning (back in 2007 or so), there was cloud. And it was mostly SaaS, as organizations eagerly consumed business-ready offerings that replaced previously rented line of business apps...
To untangle the complexity inherent in IT automation today, we need to find a better way to construct the workflows that represent the processes used to deploy, manage, and configure IT...
SEATTLE – F5 Networks (NASDAQ: FFIV) today announced that it has been positioned by Gartner, Inc. in the Leaders quadrant of its Magic Quadrant for Web Application...
F5 SVP Calvin Rowland: "With SovLabs, customers are able to configure and deploy BIG-IP services directly from vRealize Automation. This innovative approach helps to bridge NetOps and...
It’s no secret that security is the leading concern for the majority of public cloud users, but for some organizations and government agencies, it is even more paramount. For these groups, highly...
IT has to embrace standardization of the code that makes IT go or risk creating systems that syphon off the financial and efficacy benefits of IT automation. I spent nearly a decade developing...
Gray hats might have good intentions launching their “vigilante” botnets, but are they really helping us win the war against Death Star-sized thingbots?
If you haven’t noticed, containers are continuing to build momentum with a surprising speed. Not even cloud can brag of this kind of zealous adoption. While it’s important to remember that...
Big data. Petabytes generated on an hourly basis for millions of sensors and monitors embedded in things across the business value chain. From manufacturing to delivery, from POS to consumers, data...
Colloquialisms. These are those words and phrases that have a uniquely local meaning that can confound those not native to the area. For example, when I’m out and about and thirsty, I look for a...
With “thingbots” now launching Death Star-sized DDoS attacks, hosting banking trojans, and causing physical destruction, all signs are pointing to them becoming the attacker infrastructure of the...
Using an F5 security solution in the Microsoft Azure cloud, the organization protected its data and ensured compliance with a scalable web application firewall.
To assess the current state of IoT threats, F5 Labs released its global threat report—The Hunt for IoT Vol. 3: The Rise of Thingbots—which examined how attackers have developed botnets to target...
Programmable proxies protect ports from predators – like those targeting SMB today. When the Internet was in its infancy, my oldest three children were teenagers. Even then – with a far...
F5 CEO Francois Locoh-Donou sits down with GeekWire to discuss his background, encouraging young Africans to study technology and become entrepreneurs, and cashew farming. August 11, 2017 — GeekWire
F5's David Holmes looks back at the recently concluded DC25 and ponders future attendance.
In January of 2017, the very popular MongoDB suffered what seems to be becoming a fairly predictable tactic for attackers: taking data hostage. Subsequent investigation noted that for the most...
F5 Networks (NASDAQ: FFIV) announced the results of a recent survey comparing the views of over 850 NetOps and DevOps IT professionals on their respective disciplines and collaboration practices....
There are two sides to every coin, so the old adage goes. It goes without saying that both sides of the coin are the same color even if they bear different images. So we discovered when...
Much is made of the archetypical relationship between DevOps and NetOps. We are constantly barraged with a litany of “us versus them” rhetoric that pits the one against the other...
F5's principal threat research evangelist puts on his reporter hat to bring you some insights from one of the oldest hacker conferences there is.
This series explores how InfoSec practitioners can use math, technology, and critical thinking to mitigate risk in a world where networks and data have surpassed the scope of human comprehension.
Securing your data and infrastructure while transitioning to cloud (and software-defined everything) is complicated, but throw in tighter, stricter regulatory compliance and then you really have...
The slow but steady migration to cloud-based environments has had an impact on many aspects of IT. One we rarely make mention of is administration. But we should.
You’re going to need a platform for automation and orchestration. Serverless might be just what you were looking for. Serverless (a.k.a. Function as a Service) is still very much in its infancy....
While apps represent opportunities to improve productivity and increase profits, poor performance and annoyed users bring these gains to a halt.
F5's Lee Slaughter offers his take on the 'zero trust' model, along with solutions from F5 and Google.
SVP Calvin Rowland breaks down what it means for organizations to deploy multi-cloud solutions, touching on DevOps topics as well.
F5 DevCentral's Pete Silva takes a look at tech trends thus far in 2017, with ransomeware (still) top-of-mind.
"The Dawn Of 5G: Will Wireless Kill the Broadband Star?": https://t.co/TTIJoYrFTE via @Forbes
3 hours ago
"Nine ways you can get IT and sales on the same team": https://t.co/xraf6Mg32F via @Forbes
5 hours ago
[Video] F5's 'best of breed' #VNFs looking forward to #5G and #IoT: https://t.co/zFIAZFKTU4 via @HPE_CSP
7 hours ago
Building a smart, sustainable #cloud strategy? Download our eGuide and future-proof app delivery in the cloud:… https://t.co/KRFfj0TvtD
9 hours ago
RT @CalvinWRowland: @F5Networks and @vmwarecloudaws drive your journey to AWS: https://t.co/8rZGVVssgp
9 hours ago
Better understand the threat of #Thingbots on your infrastructure, download the latest @F5Labs #IoT report:… https://t.co/6kxR7sDjDt
11 hours ago
.@F5Labs @dunsany's series on "#Phishing for Information" continues, focusing on data leaks: https://t.co/m5rJSew8tN https://t.co/N7Ob8s0Q6N
13 hours ago
Learn more about our #Security Workshop, Securing Apps with @F5Security Solutions: https://t.co/1p9yrdpc8a https://t.co/6Hgpd82lOP
15 hours ago
"How to rediscover your inspiration at work": https://t.co/9lqRZwt5S1 via @HarvardBiz
16 hours ago
"Sharing is caring, but keep your botnets to yourself" by @F5NetworksAPJ's Rob Malkin: https://t.co/2bbtK0fKeW via… https://t.co/o8fBZZwauy
1 day ago
"Half of connections in North America will be on #5G by 2025, GSMA says": https://t.co/zDSUCDhW9l via @ZDNet
1 day ago
Consistency is the key to conquering #multicloud challenges with confidence, see how with F5 & @vmwarecloudaws:… https://t.co/0j0qipnKxf
1 day ago
Discover the rise of the #Mirai thingbots and more, in @F5Labs' "The Hunt for #IoT" Threat Analysis Report:… https://t.co/t9sD7wjgry
1 day ago
RT @F5Security: "Ceding control of #IoT for the sake of security" by @lmacvittie: https://t.co/rVbNY4VJnh https://t.co/U355wITd3f
1 day ago
Read why @lmacvittie believes #cloud has become a catalyst for insecure practices: https://t.co/90n1nF8kSg https://t.co/P8QxkwAYqf
1 day ago
[#Whitepaper] The Industrial Internet of Things and Network #Security: https://t.co/ezJjqJxJ8j #IIoT https://t.co/ESSmAlmoSU
1 day ago
"Is it a bird? Is it a plane? No, it's the latest security threat" ft. F5's @Keiron_Shep: https://t.co/Jfqnl4V53H v… https://t.co/gWpPtbuZmz
1 day ago
"Three examples of #IoT in the enterprise": https://t.co/l77JZHvk6b via @iotagenda
1 day ago
"It's time for IT to take control of #mobile apps": https://t.co/IfSyBXPY5R via @Computerworld #BYOD
2 days ago
"Why #hybridcloud is the future of enterprise IT": https://t.co/8slZED21NR via @NetworkWorld #cloud
2 days ago
Back to the Newsroom Home Page