Archivar Search Articles Inteligencia sobre amenazas a la aplicación: ¿qué necesitan saber los CISOs? by: Mike Convertino Siempre menciono cuán importante es una fuerte gestión del riesgo para un CISO. Cuando se trata de riesgo, las aplicaciones de las que dependen los usuarios son una gran preocupación. En una encuesta de seguridad realizada en el... Eight Reasons Why the Future of Scaling Containers is Service Mesh by: Lori MacVittie Microservices are great for development velocity, but the complexity in these architectures lies in the service-to-service communication that microservices depend on. There are, right now, at least three different architectural options for... Per-App Architectures Protect Apps at Home and in the Cloud by: Lori MacVittie The data center is being driven to change by digital transformation, with cloud, containers, and catastrophic breaches prompting this evolution sooner rather than later. The Three AWS Web Application Firewall Managed Rules You Need to Deploy Now by: Lori MacVittie A mind-boggling number of applications reside in the cloud without any protection. No web app firewall. No identity or access control. Nothing. They’re just out there, open to attack. That’s a nightmare for business, and a dream come true for... Workflows versus APIs by: Lori MacVittie There's an API tax. It's the time and technical debt incurred by executing complex processes using individual API calls. And it grows as processes expand. WhiteHat and F5 join forces to deliver total web app security by: Frank Strobel Firms of all sizes rely on web applications for just about everything. Unfortunately, attackers know this too. What Makes a WAF Advanced? by: Brian A. McHenry As the threat landscape evolves, so must our security controls and countermeasures. The most advanced perimeter threats for data loss or exfiltration occur at the application layer... Business as Usual, Making the CISO Smile by: Mark Campbell As organizations transform the business with new applications and automation, it usually means exposing these business applications to the Internet and all the dangers that come with it. Advanced threats require advanced solutions by: Ram Krishnan Perspective from F5 SVP Ram Krishnan around digital transformation, and applications' role as both key business driver and high-value target. There is no such thing as a non-critical app when it comes to security by: Lori MacVittie At Thermopylae, so the story goes, the Persians were able to defeat the Spartans by outflanking them thanks to a narrow goat path rather than the expected frontal assault. Why A Per-App Approach to Application Services Matters by: Lori MacVittie I can’t read minds (my kids would disagree but that’s neither here nor there) but I can read the responses to our State of Application Delivery survey. And when I read them through the lens of self-identified app developers I see a very... How Cloud and Containers are Driving Application Services to Disaggregate by: Lori MacVittie Applications drive decisions on everything from location to the form-factor of delivery infrastructure, based on app needs and requirements. Open Source Spotlight: What’s New for F5 in Ansible 2.5 by: Lori MacVittie New F5 modules have been added with more security profiles, licensing support, and monitoring. More information and community support for a variety of playbooks is available on DevCentral or Github. Balancing Security and Performance with Web Application Firewalls by: Lori MacVittie Using a WAF you can parse, pull apart, twist, and modify content however you want. But just because you can, doesn’t mean you should. F5’s BIG-IP and IBM Cloud Private Integration by: Craig Scarborough Microservice architectures are becoming the standard for cloud native workloads, but what about layer 4–7 services? Next Page