Archivieren Search Articles

Security Rule One: You’re probably violating it right now

by: Lori MacVittie

By now you’ve heard Security Rule Zero enough to know it by heart. You do know it by heart, right? Just in case, let me refresh your memory: THOU SHALT NOT TRUST USER INPUT. EVER. Excellent. Now that we’ve got that fundamental rule established...

Security Rule Zero: A Warning about X-Forwarded-For

by: Lori MacVittie

Proxies operate on the premise that they exist to forward requests from one system to another. They generally add some value like load balancing (scale), data leak prevention (security), or compression (performance).

F5 Achieves AWS Networking Competency

by: David Helfer

The BIG-IP Virtual Edition showcased its ability to ensure performance, availability, and security for business-critical applications hosted within the AWS cloud.

Open Source Spotlight: F5 Announces It Will Commit More than Code

by: Lori MacVittie

Open source has come a long way (baby) since the days of lengthy downloads and subsequent custom compiles of Slackware.

HTTP Rising: Telemetry, Tracking, and Terror in Container Environs

by: Lori MacVittie

HTTP is ubiquitous. If a device has networking capabilities, it probably speaks HTTP as fluently as you speak your native language.

Cloud Can’t Protect You Against Yourself

by: Lori MacVittie

Cloud security. The term itself is actually meaningless without qualification. Do you mean the security of the underlying infrastructure that makes up “cloud”? Or perhaps of command and control APIs that let you provision and manage compute,...

How to Win at Multi-Cloud: Standardize then Automate to Innovate

by: Lori MacVittie

Cloud has always been about realizing economies of scale. With digital transformation driving organizations to seek new opportunities to improve productivity (internal) and profit (external) with applications, the rate at which operations and apps...

Managing Digital Certs: Making the Essential Less Annoying

by: Dan Schrader

F5's Dan Schrader highlights how BIG-IQ makes SSL certificate management (and your life) a bit easier.

Open Source Spotlight: F5 Infrastructure as Code and Multi-Cloud Manageability

by: Lori MacVittie

You might have noted that a significant drum beat under the multi-cloud mantra is manageability. That’s because the task of scaling, securing, and delivering apps to users requires a certain set of services – load balancers, compute, storage, app...

Understanding the state of cloud journey in Asia Pacific

by: Keii

This year we hosted a series of Cloud focused events in the region and were fortunate to be able to connect with a number of customers. In this blog, I would like to summarize where those customers are, in terms of their Cloud shift, and wrap up...

Speed and Scale: F5 BIG-IP as Ingress control for Kubernetes

by: Lori MacVittie

There’s as much confusion as there is chaos in container land. Every day seems to bring some new capability or component to the world of container orchestration environments. That’s necessary, because it’s still maturing as use of containers...

The Risks of Running HTTP are Increasing but Manageable

by: Lori MacVittie

Whether we like it or not, HTTP is the de facto application transport protocol of the modern age. We use it everywhere. It’s as ubiquitous as IP and TCP, and serves much the same purpose. Its only goal is to transport the digital gold of today’s...

Combat Commodified Attacks with Managed Security Services

by: Lee Slaughter

Anyone with access to a computer can point a DDoS-for-hire push button tool anywhere they want for just a few bucks. The sophistication is low and the accessibility is high, meaning the frequency of these attacks is primed to increase.

The New OSI Network Stack: Containers and Half-Layers

by: Lori MacVittie

Back in 1983, a group of like-minded folks in the computer and telecom industries got together to create a detailed specification they called the Open Systems Interconnection (OSI).

Open Source Spotlight: OpenStack LBaaS Enhanced Service Definitions

by: Lori MacVittie

One of the often mentioned benefits of cloud – private or public, on-prem or off – is speed. Speed to provision, speed to scale, speed to ultimately get an app delivered to the users who desire or demand its functionality. To get that speed, much...