F5 Blog

 

Inteligencia sobre amenazas a la aplicación: ¿qué necesitan saber los CISOs?

by: Mike Convertino

Siempre menciono cuán importante es una fuerte gestión del riesgo para un CISO. Cuando se trata de riesgo, las aplicaciones de las que dependen los usuarios son una gran preocupación. En una encuesta de seguridad realizada en el...

How to Win at Multi-Cloud: Standardize then Automate to Innovate

by: Lori MacVittie

Cloud has always been about realizing economies of scale. With digital transformation driving organizations to seek new opportunities to improve productivity (internal) and profit (external) with applications, the rate at which operations and apps...

Managing Digital Certs: Making the Essential Less Annoying

by: Dan Schrader

F5's Dan Schrader highlights how BIG-IQ makes SSL certificate management (and your life) a bit easier.

Open Source Spotlight: F5 Infrastructure as Code and Multi-Cloud Manageability

by: Lori MacVittie

You might have noted that a significant drum beat under the multi-cloud mantra is manageability. That’s because the task of scaling, securing, and delivering apps to users requires a certain set of services – load balancers, compute, storage, app...

Understanding the state of cloud journey in Asia Pacific

by: Keii

This year we hosted a series of Cloud focused events in the region and were fortunate to be able to connect with a number of customers. In this blog, I would like to summarize where those customers are, in terms of their Cloud shift, and wrap up...

Speed and Scale: F5 BIG-IP as Ingress control for Kubernetes

by: Lori MacVittie

There’s as much confusion as there is chaos in container land. Every day seems to bring some new capability or component to the world of container orchestration environments. That’s necessary, because it’s still maturing as use of containers...

The Risks of Running HTTP are Increasing but Manageable

by: Lori MacVittie

Whether we like it or not, HTTP is the de facto application transport protocol of the modern age. We use it everywhere. It’s as ubiquitous as IP and TCP, and serves much the same purpose. Its only goal is to transport the digital gold of today’s...

Combat Commodified Attacks with Managed Security Services

by: Lee Slaughter

Anyone with access to a computer can point a DDoS-for-hire push button tool anywhere they want for just a few bucks. The sophistication is low and the accessibility is high, meaning the frequency of these attacks is primed to increase.

The New OSI Network Stack: Containers and Half-Layers

by: Lori MacVittie

Back in 1983, a group of like-minded folks in the computer and telecom industries got together to create a detailed specification they called the Open Systems Interconnection (OSI).

Open Source Spotlight: OpenStack LBaaS Extended Service Definitions

by: Lori MacVittie

One of the often mentioned benefits of cloud – private or public, on-prem or off – is speed. Speed to provision, speed to scale, speed to ultimately get an app delivered to the users who desire or demand its functionality. To get that speed, much...

Automation, Clouds, and Continuous Delivery: Learning What to Learn

by: Robert Haynes

F5's Robert Haynes gives a quick run-down of automation topics to consider (and where to start).

Why CVEs Should Be Given Priority One for Resolution

by: Lori MacVittie

When considering vulnerabilities, remember application security is a stack. You may have heard me say this before, but sometimes we need a reminder that modern applications are never deployed alone.

Scary Candy Week: KRACK and ROCA

by: David Holmes

What You Need to Know and What You Need to Do – It’s not a coincidence that Halloween falls in October. We humans have a heightened fear perception this time of year; it’s some kind of vestigial response to the shortening of days.

Where does a WAF fit in the data path?

by: Lori MacVittie

The data path contains multiple insertion points at which a WAF can be deployed. But that doesn’t mean every insertion point is a good idea.

How Container Orchestration Environments Impact Health Monitoring

by: Lori MacVittie

At the heart of availability is monitoring. Every load balancer – before it chooses a target resource – has to know whether that resource is actually available or not. Otherwise, what’s the point? In environments where resources have lifetimes...