CONTRIBUTOR DAVID HOLMES

blog /oct. 26, 2017

Reaper: The Professional Bot Herder’s Thingbot

While Reaper might be considered an “object lesson” today, it should serve as a blistering warning that IoT security needs to be fixed now.

blog /oct. 03, 2017

Proposed Legislation Calls for Cleaning Up the IoT Security Mess

Legislation is a good first step toward persuading IoT manufacturers (who want to stay in business) to do the right thing when it comes to the security of their devices.

blog /sept. 21, 2017

Profile of a Hacker: The Real Sabu, Part 2 of 2

New information sheds light on Sabu’s activities following the revelation of his identity.

blog /sept. 13, 2017

Five Reasons the CISO is a Cryptocurrency Skeptic—Starting with Bitcoin

There’s a lot of hype surrounding cryptocurrencies, but what’s good for currency traders may not be great for security-minded professionals.

blog /août 01, 2017

RSA in a “Pre-Post-Quantum” Computing World

Quantum computing is coming. What should your strategy be today to deal with what’s on the horizon?

report /juil. 13, 2017

How Quantum Computing Will Change Browser Encryption

Safeguarding TLS against attack in the quantum computing age will require changes to today’s TLS key exchange algorithms.

blog /mai 16, 2017

Strike Back at Silent Bob: Scan and Block Ports Used by Intel AMT

Is the Intel AMT vulnerability as bad as we all first thought? Either way, here are some suggestions for protecting yourself.

blog /avr. 18, 2017

Profile of a Hacker: The Real Sabu, Part 1 of 2

Notorious hacker of Anonymous and LulzSec fame is challenged by rival hacker, The Jester, to reveal his identity.

report /janv. 19, 2017

The 2016 TLS Telemetry Report

In just four short years, encryption estimates have gone from almost non-existent (in the low single digits before 2013) to just over 50% by the end of 2016. How much of a victory is this?

article /oct. 23, 2016

DARPA Proves Automated Systems Can Detect, Patch Software Flaws at Machine Speed

According to DARPA, it takes an average of 312 days for security pros to discover software vulnerabilities such as viruses, malware, and other attacks. In hacker time, that’s a virtual eternity in which bad actors can wreak havoc.

article /août 02, 2016

We Expected SSL Everywhere, and It's Well on the Way

Malicious actors and eavesdroppers are forcing Internet communication into a single cryptographic protocol: SSL.

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.