Archivieren Search Articles

Bot Defense Should be a Key Component of a Proactive Security Strategy

by: Lori MacVittie

Usually when we talk about app protection we immediately focus on web application firewalls. Specifically, we tend to focus on the OWASP Top Ten and application layer vulnerabilities that can lead to becoming just another security statistic. ...

The Surprising Truth about Digital Transformation: Skipping Security

by: Lori MacVittie

It will be no surprise for many IT veterans to hear that when app performance becomes an issue, security is the first service out the door.

Open Source Spotlight: Increasing Observability with F5 Cloud Logger iApp

by: Lori MacVittie

Developers (and DevOps) crave observability. That’s visibility, but with more alacrity, meaning APIs and integration with tools and dashboards.

Application Services Update: More than 4 in 5 use SSL Termination

by: Lori MacVittie

It’s time again to dig into the application services organizations are actually using to make apps faster and safer. Of note this quarter again is a continuing rise in use of bot defense services. Security application services in general all made...

The Surprising Truth about Digital Transformation: Cloud Chaos

by: Lori MacVittie

This is the second blog in a series from Lori MacVittie. Let us note that the chaos associated with cloud is most often a people and process problem, not a technical one.

Top Five Scalability Patterns

by: Lori MacVittie

Availability is serious business in an economy where applications are currency. Apps that don’t respond are summarily deleted and bad mouthed on the Internet with the speed and sarcasm of a negative Yelp review. Since the earliest days of the...

The Surprising Truth about Digital Transformation and What It’s Doing to Your Network

by: Lori MacVittie

It’s not really that technology is changing all that much, it’s more the fact that how we engage with technology is rapidly changing.

F5 Anti-Bot Mobile SDK Extends Bot Protection to Mobile Apps

by: Byron McNaught

Byron McNaught looks at the ways back-end mobile API components can be exposed to automated attacks such as content scraping, denial of service, and a wave of other new threats (and what you can do about it).

F5: An Initial Launch Member of Microsoft’s Intelligent Security Association

by: Tom Atkins

The security of applications, data, and networking infrastructure is now more critical than ever, given the continued evolution of cyberattack vectors and the frequency at which they occur. It is predicted that by 2021 cyber-crime will cost...

Load Balancing Apps and APIs: Algorithms versus Architecture

by: Lori MacVittie

For the most part, scaling apps and APIs are pretty much the same thing. Both require some sort of load balancer – usually a proxy – and are required to distribute requests across a pool of resources. But there is a fairly significant difference...

IT Automation is Strategic

by: Lori MacVittie

What if I told you that “mainframes host more transactions daily than Google (1.3 million/second on CICS vs. 68,542/second on Google), including 55 percent of all enterprise transactions.” (Forbes) Would you be shocked? You shouldn’t. While...

Azure Stack Support – Expanding F5’s Multi-Cloud Ecosystem

by: Tom Atkins

F5 empowers Azure users to further enhance the hybrid capabilities of architectures through replication of supporting application services across environments.