Archivar Search Blogs

New FIPS and Turbo SSL Appliances

by: Ankita Bhalla

F5 rounds out its appliance portfolio with improved price/performance, along with enhanced security and compliance features.

BIG-IP Cloud Edition: The Security Advantage of Per-App Architectures

by: Zach Westall

Apps introduce risk, and the apps that rely on other apps introduce even more risk – Zach Westall continues his blog series on BIG-IP Cloud Edition

The Surprising Truth about Digital Transformation: Container Confusion

by: Lori MacVittie

This is the last blog in a series on the challenges arising from digital transformation. The Surprising Truth about Digital Transformation The Surprising Truth about Digital Transformation: Cloud Chaos The Surprising Truth about Digital...

A Brief Catch-Up Ahead of the AWS Public Sector Summit

by: Tom Atkins

Each year, Washington D.C. plays host to one of the largest cloud-oriented public sector gatherings on the planet – AWS’ suitably dubbed Public Sector Summit.

Bot Defense Should be a Key Component of a Proactive Security Strategy

by: Lori MacVittie

Usually when we talk about app protection we immediately focus on web application firewalls. Specifically, we tend to focus on the OWASP Top Ten and application layer vulnerabilities that can lead to becoming just another security statistic. ...

Application Services Update: More than 4 in 5 use SSL Termination

by: Lori MacVittie

It’s time again to dig into the application services organizations are actually using to make apps faster and safer. Of note this quarter again is a continuing rise in use of bot defense services. Security application services in general all made...

The Surprising Truth about Digital Transformation and What It’s Doing to Your Network

by: Lori MacVittie

It’s not really that technology is changing all that much, it’s more the fact that how we engage with technology is rapidly changing.

F5 Anti-Bot Mobile SDK Extends Bot Protection to Mobile Apps

by: Byron McNaught

Byron McNaught looks at the ways back-end mobile API components can be exposed to automated attacks such as content scraping, denial of service, and a wave of other new threats (and what you can do about it).

F5: An Initial Launch Member of Microsoft’s Intelligent Security Association

by: Tom Atkins

The security of applications, data, and networking infrastructure is now more critical than ever, given the continued evolution of cyberattack vectors and the frequency at which they occur. It is predicted that by 2021 cyber-crime will cost...

How IoT can compromise network integrity

by: Bernd Kunze

The IoT (Internet of Things) is shaking up the networking space and paving the way for machine-to-machine (M2M) communication and automated processes.

Incredible security content at F5’s ANTICIPATE 2018 event

by: David Holmes

“Guys, did you hear? The team in ASEAN is building a security conference to rival the best in business. They call it ANTICIPATE!” That’s the rumor going around the F5 world and its true. We’re aiming high in Singapore to build a world-class...

BIG-IP Cloud Edition: Per-app Security and Scale

by: Lori MacVittie

There is a new network coming to a data center near you. And by ‘near you’ I mean within walking distance of your desk. Whether we like it or not, pressure from digital transformation continues to drive development of new apps at a frantic pace....

Per-App Architectures Protect Apps at Home and in the Cloud

by: Lori MacVittie

The data center is being driven to change by digital transformation, with cloud, containers, and catastrophic breaches prompting this evolution sooner rather than later.

The Three AWS Web Application Firewall Managed Rules You Need to Deploy Now

by: Lori MacVittie

A mind-boggling number of applications reside in the cloud without any protection. No web app firewall. No identity or access control. Nothing. They’re just out there, open to attack. That’s a nightmare for business, and a dream come true for...