by: Mike Convertino
Siempre menciono cuán importante es una fuerte gestión del riesgo para un CISO. Cuando se trata de riesgo, las aplicaciones de las que dependen los usuarios son una gran preocupación. En una encuesta de seguridad realizada en el...
by: Lori MacVittie
#LockTheDoor already You would think by now that nothing about security would surprise me. Maybe it’s not that I’m surprised, but rather I’m disappointed. Disappointed in the failure to adhere to even the most basic of security principles. You...
by: Lori MacVittie
Today, one of the most frequently heard questions in the halls of an infrastructure provider is how to explain the value of that infrastructure to the developer community. Trouble is, most of the benefits of infrastructure are garnered after...
by: Lori MacVittie
Implied in that question is the conclusion that you should. For decades now we have been deploying the application services that comprise much of the production pipeline on shared platforms. Application services like load balancing, application...
by: Lori MacVittie
Is it really all or nothing for network automation? Network automation – the practice of DevOpsing the production pipeline – is already in use by a significant percentage of organizations. While very few are fully engaged, the majority (77%...
by: Lori MacVittie
It’s also largely ineffective The Internet works largely because of DNS. The ability to match a site with an IP address – needed to route requests and responses across the Internet – is what ultimately makes the Internet usable. The majority of...
by: Frank Strobel
One of the interesting things about the cyber security industry is the degree to which vendors essentially wind up on the same side.
by: Lori MacVittie
Sometimes I love reading commentary from El Reg on IT and technology. Delivered with just the right amount of bite, their bark is often right on target. Other times, though, they miss the mark in their biting commentary. In a diatribe on cloud...
by: Lori MacVittie
So says the data. It would be easy to dismiss the importance of network automation by claiming that the size of your organization (and subsequently, demand) doesn’t warrant the admittedly significant effort required. After all, if there’s only...
by: Lori MacVittie
Or is that ‘tears’ of frustration? ¯\_(ツ)_/¯ Perhaps it’s both. There is a relationship between network and application architectures. Usually we like to talk about how changes and shifts in application architectures impact the...
by: Lori MacVittie
In a more balanced world, application users would have the same level of concern for the security of their data as they do for their access to it.
by: Zach Westall
Zach Westall explains what intelligent traffic management, orchestration, and autoscaling have to do with a good party, wrapping up his series on BIG-IP Cloud Edition.
by: Lori MacVittie
Oh yes. It’s happening. Consider making it a part of your overarching cloud strategy to make the process less painful. What do the following have in common? Salmon, Canadian Geese, Monarch butterflies, and applications. If you guessed all of...
by: Lori MacVittie
Back in 2015, I noted that Software was Eating IT. That was based on data culled from a variety of industry sources included RightScale, HBR, PWC, and others. From development to deployment to delivery, software was taking over everywhere. But...
by: Graham Alderson
What do terms like Identity Perimeter and Zero Trust actually mean for you? Graham Alderson takes a look in the context of F5's new Access Manager.