What if I told you that “mainframes host more transactions daily than Google (1.3 million/second on CICS vs. 68,542/second on Google), including 55 percent of all enterprise transactions.”...
F5 empowers Azure users to further enhance the hybrid capabilities of architectures through replication of supporting application services across environments.
F5 is at Red Hat Summit this week demonstrating multi-cloud capabilities with OpenShift Containers, Ansible automation, and Aspen Mesh / Istio insight.
Site Reliability Engineer (SRE) is a relatively new role – usually within engineering or operations – focused on maintaining, unsurprisingly, site reliability. That generally means availability of...
Lori MacVittie: If you’re going to automate all the things, go declarative.
There is a new network coming to a data center near you. And by ‘near you’ I mean within walking distance of your desk. Whether we like it or not, pressure from digital transformation continues to...
The IoT (Internet of Things) is shaking up the networking space and paving the way for machine-to-machine (M2M) communication and automated processes.
Lori MacVittie looks at how technologies like F5 Container Connector help navigate the routes between modern environments and traditional networking.
“Guys, did you hear? The team in ASEAN is building a security conference to rival the best in business. They call it ANTICIPATE!”
That’s the rumor going around the F5 world and its true. We’re...
As DevOps approaches creep over the wall into network operations, it drags with it new terminology. These colloquialisms can be confusing to NetOps who’ve not encountered them before, and can...
SEATTLE – F5 Networks (NASDAQ: FFIV) today introduced BIG-IP Cloud Edition, available May 31, enabling customers to quickly deploy critical application services for every app and any...
The recent State of the Internet/Security Report from Akamai shows that the number of Distributed Denial of Service (DDoS) attacks continues to increase—rising 14% over last year. This might not...
SEATTLE – F5 Networks, Inc. (NASDAQ: FFIV) today announced revenue of $533.3 million for the second quarter of fiscal 2018, up 2.9% from $518.2 million in the second quarter of fiscal 2017....
The data center is being driven to change by digital transformation, with cloud, containers, and catastrophic breaches prompting this evolution sooner rather than later.
Microservices are great for development velocity, but the complexity in these architectures lies in the service-to-service communication that microservices depend on. There are, right now, at...
There's an API tax. It's the time and technical debt incurred by executing complex processes using individual API calls. And it grows as processes expand.
A mind-boggling number of applications reside in the cloud without any protection. No web app firewall. No identity or access control. Nothing. They’re just out there, open to attack. That’s a...
CANBERRA, AUSTRALIA – Coinciding with the ACSC conference this week, F5 Networks (NASDAQ: FFIV) is announcing its Advanced Web Application Firewall™ solution for comprehensive application...
Perspective from F5 SVP Ram Krishnan around digital transformation, and applications' role as both key business driver and high-value target.
Firms of all sizes rely on web applications for just about everything. Unfortunately, attackers know this too.
As the threat landscape evolves, so must our security controls and countermeasures. The most advanced perimeter threats for data loss or exfiltration occur at the application layer...
As organizations transform the business with new applications and automation, it usually means exposing these business applications to the Internet and all the dangers that come with it.
At Thermopylae, so the story goes, the Persians were able to defeat the Spartans by outflanking them thanks to a narrow goat path rather than the expected frontal assault.
I can’t read minds (my kids would disagree but that’s neither here nor there) but I can read the responses to our State of Application Delivery survey. And when I read them through the lens of...
Apache Struts 2 Jakarta Multipart Parser RCE crypto-mining campaign is now targeting Windows, not just Linux systems.
Applications drive decisions on everything from location to the form-factor of delivery infrastructure, based on app needs and requirements.
New F5 modules have been added with more security profiles, licensing support, and monitoring. More information and community support for a variety of playbooks is available on DevCentral or Github.
Using a WAF you can parse, pull apart, twist, and modify content however you want. But just because you can, doesn’t mean you should.
Laptops full of confidential data are still getting stolen, and public Wi-Fi hotspots are being booby-trapped. CISOs need to make users aware of the threat to prevent this from happening.
Microservice architectures are becoming the standard for cloud native workloads, but what about layer 4–7 services?
Developers in a RisingStack survey cite performance, security, and deployment difficulties in production environments Not all security and performance is the result of ‘bad code’. Platforms and...
State of Application Delivery report shows rise of multi-cloud architectures necessitating automation and application-centric security
Robert Haynes walks you through suggested next steps once you've completed F5's initial Super-NetOps training.
The Hunt for IoT by our own F5 Labs threat researchers continues. Its latest report exposes not only an active search for vulnerable IoT devices, but the targeting of build infrastructure.
IoT attacks show no signs of decreasing while infected IoT devices go un-remediated, and discovery of new thingbots is at a decade-long high.
When I was a wee lass getting ready to deliver my company’s very first Internet-enabled application, I learned a valuable lesson. It wasn’t about technology. It wasn’t about the Internet. It was...
Confidence in the public cloud is on the rise as the market and platforms mature, thanks in part to certification and competency validations from major providers.
AWS has just announced enhanced F5 managed security capabilities on AWS WAF around Bot Protection, CVE Vulnerabilities, and Web Exploits.
With F5 BIG-IP virtual editions, IoT-focused organizations can seamlessly deploy in public or multi-cloud environments with maximum flexibility.
OpenStack supports an increasing number of mission-critical applications, but it can still be complex to set up. F5 makes it easier.
NetOps needs to embrace DevOps methodologies and principles to restore the balance of stability and speed to support the growing number of applications deployed in the public cloud. There is a...
Apps are under siege. Attacks occur with alarming frequency – every 39 seconds according to research conducted by the University of Maryland
Download our free eBook, “Application Security: A Step Toward #GDPR Compliance,” here: https://t.co/fC0ksYvugQ… https://t.co/vHW2svAcrX
1 hour ago
“Get creative to reach the C-Suite: Explore alternate paths”: https://t.co/vconM6CoCU via @Forbes
13 hours ago
“Does #blockchain have a place in business?” https://t.co/bMYoEmeXwz via @ITPro
15 hours ago
Don't miss @lmacvittie's take on a recent SRE report: https://t.co/vjcuHbYj7E #NetOps https://t.co/9ajTkGSsU1
17 hours ago
F5 Advanced WAF uses signatures & behavioral analytics to protect your apps from multiple layer 7 attacks launched… https://t.co/GIQfNRXu7o
19 hours ago
RT @F5Security: F5 Advanced #WAF can identify and block attacks that other WAF solutions don’t have the capabilitie… https://t.co/KK5EsotU0J
20 hours ago
Did you know that #Mirai has been growing significantly in certain parts of the world? Check out @F5Labs' Threat An… https://t.co/CkYnrxCOIq
21 hours ago
“Useful or useless? Identifying the business case for #IoT”: https://t.co/PqSwZYKTe1 via @Forbes
23 hours ago
“10 best practices to keep your #IT project under budget”: https://t.co/qZcmxPK8am via @TechRepublic
1 day ago
"Are you an authentic leader?" https://t.co/pcfucbIGOy via @Forbes
1 day ago
“#IoT World: The edge is getting smarter, smaller, and moving further out”: https://t.co/2EPa6mByNM via @datacenter
1 day ago
RT @F5Security: ICYMI - “#Drupalgeddon2 highlights the need for AppSecOps” by @lmacvittie via @F5Labs:… https://t.co/gZcPDQHW9n
1 day ago
ICYMI - “@Azure Stack support – expanding F5’s #MultiCloud ecosystem” https://t.co/A2lWoOm4eq #BIGIP https://t.co/dleRwn6PUJ
1 day ago
“Managing compliance issues within the value chain” via @F5Labs' guest blogger @KipBoyle: https://t.co/DLbxZOxKPk… https://t.co/NSBgbFgkZA
1 day ago
RT @ONUG_: The Disruption of #Cloud Runs Deeper Than You Think https://t.co/qdaEiXOLAB via Lori MacVittie, Principal Technical… https://t.co/AkbJyjMPF1
1 day ago
ICYMI - “#IT automation is strategic” by @lmacvittie: https://t.co/YYJACLxi3G #cloud https://t.co/rZnqUKMhM9
1 day ago
“5 emotionally intelligent habits for handling work frustrations”: https://t.co/yFd6j6SlYs via @FastCompany
1 day ago
“Tips for reading the room before a meeting or presentation”: https://t.co/8HnaOrvWWV via @HarvardBiz
2 days ago
ICYMI - “Panda #malware broadens targets to #cryptocurrency exchanges and social media” via @F5Labs:… https://t.co/D1wMYO9x8p
2 days ago
Here are some highlights from this morning's #BikeEverywhereDay festivities in Seattle, where we celebrated with F5… https://t.co/q3tjSm0BKW
2 days ago
Back to the Newsroom Home Page