Archivar Search Articles

Inteligencia sobre amenazas a la aplicación: ¿qué necesitan saber los CISOs?

by: Mike Convertino

Siempre menciono cuán importante es una fuerte gestión del riesgo para un CISO. Cuando se trata de riesgo, las aplicaciones de las que dependen los usuarios son una gran preocupación. En una encuesta de seguridad realizada en el...

Scary Candy Week: KRACK and ROCA

by: David Holmes

What You Need to Know and What You Need to Do – It’s not a coincidence that Halloween falls in October. We humans have a heightened fear perception this time of year; it’s some kind of vestigial response to the shortening of days.

Where does a WAF fit in the data path?

by: Lori MacVittie

The data path contains multiple insertion points at which a WAF can be deployed. But that doesn’t mean every insertion point is a good idea.

How Container Orchestration Environments Impact Health Monitoring

by: Lori MacVittie

At the heart of availability is monitoring. Every load balancer – before it chooses a target resource – has to know whether that resource is actually available or not. Otherwise, what’s the point? In environments where resources have lifetimes...

How F5’s WAF Earned its AWS Security Competency

by: Tom Atkins

F5's Tom Atkins takes a closer look at the company's recently achieved AWS milestone, supporting those aiming to mitigate attacks on applications deployed in the public cloud.

Dear NetOps: Security Rule Zero Applies to You, Too

by: Lori MacVittie

Okay, NetOps. As you’re getting all automated up and scripting your hearts out, it’s time for a gentle reminder about security. I’m not talking about firewalls and WAF or other security services you may be responsible for.

Taking Customers to AWS, Through Our Channel

by: David Helfer

SVP of Worldwide Channels David Helfer highlights F5's selection for the AWS Channel Opportunity Registration Program and just-achieved AWS Security Competency.

F5 BIG-IP Availability on IBM Cloud for VMware Solutions

by: Craig Scarborough

For most enterprises, the concept of cloud is well in the process of crossing the “chasm” from early adoption to early majority.

Automation: Managing F5 BIG-IP Configurations Using Puppet

by: Mani Gadde

Most of us are still learning new ways to optimize continuous deployments and reduce release cycles. In complex environments this often includes automating, streamlining, and eliminating costly, wasteful processes.

Example-driven Insecurity Illustrates Need for WAF

by: Lori MacVittie

Learning online is big. Especially for those who self-identify as a developer. If you take a peek at Stack Overflow’s annual developer survey...

Solace and F5: Partnering for Better IoT

by: Frank Strobel

In addition to being equipped to handle huge numbers of devices and massive amounts of data traffic, IoT deployments have to be built for some unique ways of communicating.

Making Multi-Cloud Manageable: F5 Application Connector Now Available for Microsoft Azure

by: Lori MacVittie

When using multiple public clouds to host applications, you’ve still got to manage those apps and connect them to a secure inbound path.

Bots are the Bane of Turing Security Test

by: Lori MacVittie

Bots are cool. Bots are scary. Bots are the future. Bots are getting smarter every day. Depending on what kind of bot we’re talking about, we’re either frustrated or fascinated by them.

Open Source Spotlight: Auto Scaling Mesos

by: Lori MacVittie

Thanks to cloud, auto scaling applications is now nearly synonymous with scalability. And until recently, auto scaling apps with Mesos was a mostly manual endeavor.

Ceding Control of IoT for the Sake of Security

by: Lori MacVittie

We are, I think it’s safe to say, universally delighted by technology. The mundane is transformed into the magical by the mere introduction of technology. The novelty wears off after a time, of course, but by then there’s some other task that has...