As a developer, my favorite editor for writing code is vim. I know, I know. But it’s fast, I can get around in it, and it isn’t emacs. (Yeah, I went there.)
Perfect for development and test purposes, these instances provide true cloud-native operational flexibility with no long-term commitments or contracts.
There’s an old business axiom we all know that goes like this: The customer is always right. In this digital economy, it turns out that axiom has to change to read: The customer’s data is...
Brian McHenry looks at F5's diversity of WAF services and web application security capabilities in the context of a recent analyst report.
SEATTLE – F5 Networks (NASDAQ: FFIV) today announced that Mary Gardner has joined the company’s leadership team as its Chief Information Security Officer (CISO). In this role, she is...
There are days when the jargon coming out of container land makes your head swim. With each new capability or feature offered by related solutions – service mesh, orchestrators, registries – seems...
Website or apps under attack? See what F5's emergency incident response services can do for you (and the broader security community)
These virtual editions protect applications and data with complete feature parity across on-premises and multi-cloud deployments.
F5 SVP Kara Sprague outlines an evolution of physical and digital capital that has led to the present era of Application Capital as an organization's most valuable asset.
F5 rounds out its appliance portfolio with improved price/performance, along with enhanced security and compliance features.
Back in 2013, we were introduced to the concept of an immutable server. An immutable server is, as the term immutable suggests, static. Its configuration is fixed and cannot (or at least should...
One of the ways app developers are able to simplify their dev and test is to incorporate containers and microservices for maximum efficiency and portability.
SEATTLE ‒ F5 Networks (NASDAQ: FFIV) today announced that it has been named a Leader in The Forrester Wave™: Web Application Firewalls, Q2 2018 report, published June 25, 2018.
Just a few short years ago microservices were a curiosity discussed by developers with a kind of giddy excitement at the possibilities and opportunities the fledgling app architecture presented. ...
For network ops, industry shifts can prove quite disruptive as app teams bypass controls and systems that made perfect sense at one time.
F5 Labs’ Ray Pompon explores how intellectual property theft relates to your morning latte...and is also costing the U.S. $600 billion per year.
This is the last blog in a series on the challenges arising from digital transformation. The Surprising Truth about Digital Transformation The Surprising Truth about Digital Transformation:...
Apps introduce risk, and the apps that rely on other apps introduce even more risk – Zach Westall continues his blog series on BIG-IP Cloud Edition
This is the fourth blog in a series on the challenges arising from digital transformation. The Surprising Truth about Digital Transformation The Surprising Truth about Digital Transformation:...
A closer look at how F5 provides an application-centric view of the health, performance, and security of your applications and the devices that serve them.
Singapore became the number one target of cyberattacks in the world on June 11–12, with 88% deployed by Russian IP addresses.
CISOs recently ranked advanced persistent threats (APTs) as their #1 concern. F5 Labs’ Ray Pompon gives you a look at tips, tools, and some basic protections.
As part of the robust and expanding Ansible ecosystem, F5 provides a wide variety of Ansible modules to automate the onboarding, configuration and deployment of F5 application services. Enabling...
F5’s BIG-IP Cloud Edition is now released and available to order. Since you already may have read the general overview from our press release last month, I will use this blog to drill into more...
Usually when we talk about app protection we immediately focus on web application firewalls. Specifically, we tend to focus on the OWASP Top Ten and application layer vulnerabilities that can lead...
Each year, Washington D.C. plays host to one of the largest cloud-oriented public sector gatherings on the planet – AWS’ suitably dubbed Public Sector Summit.
AWS C2S, or Commercial Cloud Services as it’s otherwise known, is the name of the government program and contract vehicle that brought an air-gapped, top secret region of the AWS cloud to the U.S....
US-CERT TL18-106A alert underscores how insecure Internet systems really are and that ignoring the problem only increases the collateral damage.
It will be no surprise for many IT veterans to hear that when app performance becomes an issue, security is the first service out the door.
At F5, ADCs have always been about applications. After all, that is what the A in ADC is all about. F5 has done a good job on focusing on application delivery – our customer community, DevCentral,...
This is the second blog in a series from Lori MacVittie. Let us note that the chaos associated with cloud is most often a people and process problem, not a technical one.
It’s time again to dig into the application services organizations are actually using to make apps faster and safer. Of note this quarter again is a continuing rise in use of bot defense services....
Developers (and DevOps) crave observability. That’s visibility, but with more alacrity, meaning APIs and integration with tools and dashboards.
It’s not really that technology is changing all that much, it’s more the fact that how we engage with technology is rapidly changing.
Availability is serious business in an economy where applications are currency. Apps that don’t respond are summarily deleted and bad mouthed on the Internet with the speed and sarcasm of a...
For the most part, scaling apps and APIs are pretty much the same thing. Both require some sort of load balancer – usually a proxy – and are required to distribute requests across a pool of...
Byron McNaught looks at the ways back-end mobile API components can be exposed to automated attacks such as content scraping, denial of service, and a wave of other new threats (and what you can do...
SEATTLE – F5 announced Francis “Frank” J. Pelzer has joined the company’s leadership team as Executive Vice President and Chief Financial Officer, reporting to the CEO.
What if I told you that “mainframes host more transactions daily than Google (1.3 million/second on CICS vs. 68,542/second on Google), including 55 percent of all enterprise transactions.”...
F5 empowers Azure users to further enhance the hybrid capabilities of architectures through replication of supporting application services across environments.
The security of applications, data, and networking infrastructure is now more critical than ever, given the continued evolution of cyberattack vectors and the frequency at which they occur. It is...
"The teens who #hacked Microsoft's videogame empire–and went too far": https://t.co/LGDhbFn6lk via @WIRED #cybersecurity
5 hours ago
“Revolutionizing the network through #edgecomputing” by F5’s @lmacvittie: https://t.co/QyBpjaQYmc via… https://t.co/ihBd3USyLA
7 hours ago
Hey Agility attendees, we want to hear from you! Tell us why you're excited for #F5Agility18 & see what others are… https://t.co/JxFKfo5REr
9 hours ago
RT @F5Security: Have you seen The @forrester Wave: Web Application Firewalls? Read the report to learn why F5 was n… https://t.co/vuGG4F9Xpb
10 hours ago
If you're interested in staying up-to-speed on life at F5 and exciting job openings, be sure to follow @F5Careers f… https://t.co/4kVg5k8saJ
11 hours ago
We're happy to share that Pay-As-You-Go BIG-IP VE and Advanced #WAF are now available for #Azure Government. Learn… https://t.co/ZMNE0XjWf0
13 hours ago
“#Bots of the internet, reveal yourselves!”: https://t.co/NmwmE4SUDl via @nytimes
15 hours ago
“Programmability delivers greater agility”: https://t.co/1wbuhsovFx via @Info_Sec_Buzz cc: @F5NetworksEMEA #automation #SOAD18
17 hours ago
“5 top language for machine learning, data science”: https://t.co/eOtxdOPcsM via @InformationWeek
1 day ago
“How #IT engineers can influence process change”: https://t.co/9xlvCnb1gs via @NetworkComputin
1 day ago
In the latest installment of #LightboardLessons from @devcentral, learn how the @OPSWAT MetaDefender works seamless… https://t.co/dysVBaLgcq
1 day ago
RT @F5Security: Learn all about F5 DataSafe in a recent edition of #LightboardLessons with @JohnWagnon:… https://t.co/RXpndXjUiH
1 day ago
Discover why F5 is a leader in #WAF in a new blog from @bamchenry: https://t.co/4Onfv56IXv #AppSec https://t.co/H1i5E65bjg
1 day ago
RT @F5Labs: [Article] “Cyber attacks spike in Finland before Trump-Putin meeting” by @sarab0ddy and @sh4t:… https://t.co/vS51hlg5eh
1 day ago
"#OpenSource Spotlight: F5 Eclipse plugin for #NetOps" by @lmacvittie: https://t.co/GbEuNkIVbi https://t.co/K9Jhq9fdi0
1 day ago
“No blank checks: The value of #cloud cost governance”: https://t.co/OXNtaV8Klm via @InfoWorld
1 day ago
“Even utilities look to #innovate and transform processes”: https://t.co/GTdOpenVVI via @CIOonline #CIO
1 day ago
“5 use cases for smart city #IoT”: https://t.co/mNasv7mXVC via @GCNtech https://t.co/i60AGXmhS8
2 days ago
Back to the Newsroom Home Page