F5 Blog


Inteligencia sobre amenazas a la aplicación: ¿qué necesitan saber los CISOs?

by: Mike Convertino

Siempre menciono cuán importante es una fuerte gestión del riesgo para un CISO. Cuando se trata de riesgo, las aplicaciones de las que dependen los usuarios son una gran preocupación. En una encuesta de seguridad realizada en el...

A Brief Catch-Up Ahead of the AWS Public Sector Summit

by: Tom Atkins

Each year, Washington DC plays host to one of the largest cloud-oriented public sector gatherings on the planet - AWS’ suitably dubbed Public Sector Summit.

The Surprising Truth about Digital Transformation: Diseconomy of Scale

by: Lori MacVittie

This is the fourth blog in a series on the challenges arising from digital transformation. The Surprising Truth about Digital Transformation The Surprising Truth about Digital Transformation: Cloud Chaos The Surprising Truth about Digital...

F5 Officially Supporting Ansible for Application Services Deployment

by: Lori MacVittie

As part of the robust and expanding Ansible ecosystem, F5 provides a wide variety of Ansible modules to automate the onboarding, configuration and deployment of F5 application services. Enabling Ansible-based automation simplifies, enable...

Bot Defense Should be a Key Component of a Proactive Security Strategy

by: Lori MacVittie

Usually when we talk about app protection we immediately focus on web application firewalls. Specifically, we tend to focus on the OWASP Top Ten and application layer vulnerabilities that can lead to becoming just another security statistic. ...

The Surprising Truth about Digital Transformation: Skipping Security

by: Lori MacVittie

It will be no surprise for many IT veterans to hear that when app performance becomes an issue, security is the first service out the door.

BIG-IP VE Availability for the U.S. Intelligence Community on AWS

by: Tom Atkins

AWS C2S, or Commercial Cloud Services as it’s otherwise known, is the name of the government program and contract vehicle that brought an air-gapped, top secret region of the AWS cloud to the U.S. Intelligence Community (IC) since 2014. This h...

Open Source Spotlight: Increasing Observability with F5 Cloud Logger iApp

by: Lori MacVittie

Developers (and DevOps) crave observability. That’s visibility, but with more alacrity, meaning APIs and integration with tools and dashboards.

The Surprising Truth about Digital Transformation: Cloud Chaos

by: Lori MacVittie

This is the second blog in a series from Lori MacVittie. Let us note that the chaos associated with cloud is most often a people and process problem, not a technical one.

Application Services Update: More than 4 in 5 use SSL Termination

by: Lori MacVittie

It’s time again to dig into the application services organizations are actually using to make apps faster and safer. Of note this quarter again is a continuing rise in use of bot defense services. Security application services in general all made...

Application-Centric Management with BIG-IP Cloud Edition

by: Dan Schrader

At F5, ADCs have always been about applications. After all, that is what the A in ADC is all about. F5 has done a good job on focusing on application delivery – our customer community, DevCentral, is stuffed with application-specific deployment...

BIG-IP Cloud Edition: What You Need to Know

by: Zach Westall

F5’s BIG-IP Cloud Edition is now released and available to order. Since you already may have read the general overview from our press release last month, I will use this blog to drill into more detail on what Cloud Edition is, explain what it...

Top Five Scalability Patterns

by: Lori MacVittie

Availability is serious business in an economy where applications are currency. Apps that don’t respond are summarily deleted and bad mouthed on the Internet with the speed and sarcasm of a negative Yelp review. Since the earliest days of the...

The Surprising Truth about Digital Transformation and What It’s Doing to Your Network

by: Lori MacVittie

It’s not really that technology is changing all that much, it’s more the fact that how we engage with technology is rapidly changing.

F5 Anti-Bot Mobile SDK Extends Bot Protection to Mobile Apps

by: Byron McNaught

Byron McNaught looks at the ways back-end mobile API components can be exposed to automated attacks such as content scraping, denial of service, and a wave of other new threats (and what you can do about it).