Archivar Search Articles

Inteligencia sobre amenazas a la aplicación: ¿qué necesitan saber los CISOs?

by: Mike Convertino

Siempre menciono cuán importante es una fuerte gestión del riesgo para un CISO. Cuando se trata de riesgo, las aplicaciones de las que dependen los usuarios son una gran preocupación. En una encuesta de seguridad realizada en el...

Eight Reasons Why the Future of Scaling Containers is Service Mesh

by: Lori MacVittie

Microservices are great for development velocity, but the complexity in these architectures lies in the service-to-service communication that microservices depend on. There are, right now, at least three different architectural options for...

Per-App Architectures Protect Apps at Home and in the Cloud

by: Lori MacVittie

The data center is being driven to change by digital transformation, with cloud, containers, and catastrophic breaches prompting this evolution sooner rather than later.

The Three AWS Web Application Firewall Managed Rules You Need to Deploy Now

by: Lori MacVittie

A mind-boggling number of applications reside in the cloud without any protection. No web app firewall. No identity or access control. Nothing. They’re just out there, open to attack. That’s a nightmare for business, and a dream come true for...

Workflows versus APIs

by: Lori MacVittie

There's an API tax. It's the time and technical debt incurred by executing complex processes using individual API calls. And it grows as processes expand.

WhiteHat and F5 join forces to deliver total web app security

by: Frank Strobel

Firms of all sizes rely on web applications for just about everything. Unfortunately, attackers know this too.

What Makes a WAF Advanced?

by: Brian A. McHenry

As the threat landscape evolves, so must our security controls and countermeasures. The most advanced perimeter threats for data loss or exfiltration occur at the application layer...

Business as Usual, Making the CISO Smile

by: Mark Campbell

As organizations transform the business with new applications and automation, it usually means exposing these business applications to the Internet and all the dangers that come with it.

Advanced threats require advanced solutions

by: Ram Krishnan

Perspective from F5 SVP Ram Krishnan around digital transformation, and applications' role as both key business driver and high-value target.

There is no such thing as a non-critical app when it comes to security

by: Lori MacVittie

At Thermopylae, so the story goes, the Persians were able to defeat the Spartans by outflanking them thanks to a narrow goat path rather than the expected frontal assault.

Why A Per-App Approach to Application Services Matters

by: Lori MacVittie

I can’t read minds (my kids would disagree but that’s neither here nor there) but I can read the responses to our State of Application Delivery survey. And when I read them through the lens of self-identified app developers I see a very...

How Cloud and Containers are Driving Application Services to Disaggregate

by: Lori MacVittie

Applications drive decisions on everything from location to the form-factor of delivery infrastructure, based on app needs and requirements.

Open Source Spotlight: What’s New for F5 in Ansible 2.5

by: Lori MacVittie

New F5 modules have been added with more security profiles, licensing support, and monitoring. More information and community support for a variety of playbooks is available on DevCentral or Github.

Balancing Security and Performance with Web Application Firewalls

by: Lori MacVittie

Using a WAF you can parse, pull apart, twist, and modify content however you want. But just because you can, doesn’t mean you should.

F5’s BIG-IP and IBM Cloud Private Integration

by: Craig Scarborough

Microservice architectures are becoming the standard for cloud native workloads, but what about layer 4–7 services?