Unique report highlights the businesses best harnessing the cloud for innovation and success.
F5 appoints Michael Mak to the company’s regional leadership team to drive business growth in Greater China.
Cloud has always been about realizing economies of scale. With digital transformation driving organizations to seek new opportunities to improve productivity (internal) and profit (external) with...
Downtown Seattle's F5 Tower is featured in this New York Times article on the trend of maturing tech start-ups moving into newer high-end offices, with commentary from F5's Jay Phillips. ...
You might have noted that a significant drum beat under the multi-cloud mantra is manageability. That’s because the task of scaling, securing, and delivering apps to users requires a certain set of...
F5's Dan Schrader highlights how BIG-IQ makes SSL certificate management (and your life) a bit easier.
There’s as much confusion as there is chaos in container land. Every day seems to bring some new capability or component to the world of container orchestration environments. That’s necessary,...
Learn about the tricks attackers use to dupe unsuspecting users and how you can help protect them—and your organization.
This year we hosted a series of Cloud focused events in the region and were fortunate to be able to connect with a number of customers. In this blog, I would like to summarize where those customers...
Anyone with access to a computer can point a DDoS-for-hire push button tool anywhere they want for just a few bucks. The sophistication is low and the accessibility is high, meaning the frequency...
Proposed legislation could change existing laws that bars victims of hacking attacks from striking back.
F5's BIG-IP platform helped reduce system downtime, improve end user experience, and integrate with Cisco ACI.
Back in 1983, a group of like-minded folks in the computer and telecom industries got together to create a detailed specification they called the Open Systems Interconnection (OSI).
Whether we like it or not, HTTP is the de facto application transport protocol of the modern age. We use it everywhere. It’s as ubiquitous as IP and TCP, and serves much the same purpose. Its only...
F5's Robert Haynes gives a quick run-down of automation topics to consider (and where to start).
The data path contains multiple insertion points at which a WAF can be deployed. But that doesn’t mean every insertion point is a good idea.
What You Need to Know and What You Need to Do – It’s not a coincidence that Halloween falls in October. We humans have a heightened fear perception this time of year; it’s some kind of vestigial...
One of the often mentioned benefits of cloud – private or public, on-prem or off – is speed. Speed to provision, speed to scale, speed to ultimately get an app delivered to the users who desire or...
While Reaper might be considered an “object lesson” today, it should serve as a blistering warning that IoT security needs to be fixed now.
SEATTLE – F5 Networks, Inc. (NASDAQ: FFIV) today announced revenue of $538.0 million for the fourth quarter of fiscal 2017, up 2.4% from $525.3 million in the fourth quarter of fiscal 2016....
When considering vulnerabilities, remember application security is a stack. You may have heard me say this before, but sometimes we need a reminder that modern applications are never deployed alone.
F5's Tom Atkins takes a closer look at the company's recently achieved AWS milestone, supporting those aiming to mitigate attacks on applications deployed in the public cloud.
At the heart of availability is monitoring. Every load balancer – before it chooses a target resource – has to know whether that resource is actually available or not. Otherwise, what’s the point? ...
Combating this vulnerability might mean you have to force updates on employees’ personal devices or deny them access altogether.
Okay, NetOps. As you’re getting all automated up and scripting your hearts out, it’s time for a gentle reminder about security. I’m not talking about firewalls and WAF or other security...
SVP of Worldwide Channels David Helfer highlights F5's selection for the AWS Channel Opportunity Registration Program and just-achieved AWS Security Competency.
Learning online is big. Especially for those who self-identify as a developer. If you take a peek at Stack Overflow’s annual developer survey...
For most enterprises, the concept of cloud is well in the process of crossing the “chasm” from early adoption to early majority.
Most of us are still learning new ways to optimize continuous deployments and reduce release cycles. In complex environments this often includes automating, streamlining, and eliminating costly,...
Security breaches in the news serve as a good reminder to check and make sure you have a solid application protection strategy in place, starting with never trusting user input.
When using multiple public clouds to host applications, you’ve still got to manage those apps and connect them to a secure inbound path.
F5 Networks (NASDAQ: FFIV) today announced the addition of Steve McMillan to its leadership team as Executive Vice President of Global Services, reporting to the CEO. In this role,...
Bots are cool. Bots are scary. Bots are the future. Bots are getting smarter every day. Depending on what kind of bot we’re talking about, we’re either frustrated or fascinated by them.
Thanks to cloud, auto scaling applications is now nearly synonymous with scalability. And until recently, auto scaling apps with Mesos was a mostly manual endeavor.
In addition to being equipped to handle huge numbers of devices and massive amounts of data traffic, IoT deployments have to be built for some unique ways of communicating.
There’s a lot of hype surrounding cryptocurrencies, but what’s good for currency traders may not be great for security-minded professionals.
SINGAPORE – Today at Singapore International Cyber Week, F5 Networks (NASDAQ: FFIV) released a comprehensive report on the evolving nature of the CISO role and the IT security approaches...
Far from a dying breed, cryptocurrencies are not only evolving but being accepted in countless new markets. CISOs need to know the ins and outs, pros and cons.
As enterprises more closely align their security and IT operations, they still struggle to shift their security programs from reactive to proactive.
We are, I think it’s safe to say, universally delighted by technology. The mundane is transformed into the magical by the mere introduction of technology. The novelty wears off after a time, of...
It has been said – and not just by me – that encrypted malicious code is still malicious code. The encryption does nothing to change that...
As quickly as attackers commandeer IoT devices to build more “thingbots,” they continue to evolve their attack types and functionality.
The Ansible community requires everyone to be nice to each other, to be empathetic and to be kind. This is best evidenced by the Ansible Code of Conduct for events. One excerpt: “Ansible is...
F5 SVP Calvin Rowland walks you through the mindset of moving to the cloud, with a nod to just announced IBM/VMware/F5 solutions.
Over the past year, F5 and Ansible have been working hard to bring network automation solutions to our customers.
In successive releases, Ansible has introduced more and more network automation...
Along with their just-opened San Jose data center, Equinix leverages F5 BIG-IP for application services to support multi-cloud interconnection.
"Supercomputers coming soon to an office near you": https://t.co/YNHOfYNgoI via @TechRepublic
28 minutes ago
Read how a financial institution in Asia enhanced performance and access to its banking services with… https://t.co/keeyC520Rz
2 hours ago
"10 more things I don't miss about old technology": https://t.co/SET8F2CWPa via @TechRepublic
4 hours ago
"How to keep mooches and spies off your Wi-Fi network and files": https://t.co/3OkXkX7OA6 via @USATODAY
6 hours ago
To our followers celebrating today, #HappyThanksgiving! https://t.co/h7itsdTMAE
8 hours ago
RT @F5Security: "How to give your parents the security talk this #Thanksgiving": https://t.co/iB3dd567i9 via @CNET #Cybersecurity
10 hours ago
"'Goldilocks' legislation aims to clean up #IoT #security" by @dunsany: https://t.co/wJ72znKu4H via @DarkReading https://t.co/H1C7QvGCzQ
10 hours ago
"Securing e-commerce for #BlackFriday and beyond" by @F5NetworksEMEA's Martin Walshaw: https://t.co/HEQJhReuIG via… https://t.co/jhCORde2dG
13 hours ago
"The Rise of Thingbots in the Philippines" featuring @F5Labs research: https://t.co/Q6NlGxMLXI via @manilabulletin… https://t.co/C8EHmeZSnw
1 day ago
"Companies turn to war games to spot scarce #cybersecurity talent": https://t.co/RkuvFa4BPC via @technology
1 day ago
Want to win at #multicloud? @lmacvittie suggests standardizing then automating to innovate: https://t.co/eGLB0ABi0p… https://t.co/Q8cljALlQi
1 day ago
"A #CISO Landmine: No security awareness training" by @F5Labs guest blogger @MDLevin: https://t.co/z1dh8TD3Aj https://t.co/LLBED8p639
1 day ago
Don't get hooked by a phisher's lure this holiday season, read the latest @F5Labs report on #phishing:… https://t.co/xsT9BVZUSR
1 day ago
Here's how to avoid four risks of the #cloud: https://t.co/qGpBcsDZHy #wemakeappsgo https://t.co/KCLUS6vR93
1 day ago
Checkout @devcentral's technical blog series on "Building an OpenSSL Certificate Authority" :… https://t.co/CO6XfyJfBX
1 day ago
"To jump through the hoops of digital disruption, be agile": https://t.co/PDzp4bw24l via @Forbes
1 day ago
[Press Release] @F5NetworksAPJ names Michael Mak as General Manager of Hong Kong and Macau to drive business growth… https://t.co/XmkpQYJS5t
2 days ago
"F5's Helfer on partnering with AWS, building relationships with VMware and Cisco, and making #cloud economics work… https://t.co/xjBbxQcH1u
2 days ago
93% of web application attacks were linked to organized crime, protect your apps with a managed #security service:… https://t.co/DfKbgzpsBL
2 days ago
Back to the Newsroom Home Page