CONTRIBUTOR RAY POMPON

report /nov. 16, 2017

Phishing: The Secret of its Success and What You Can Do to Stop It

Learn about the tricks attackers use to dupe unsuspecting users and how you can help protect them—and your organization.

blog /nov. 09, 2017

Is a Good Offense the Best Defense Against Hackers?

Proposed legislation could change existing laws that bars victims of hacking attacks from striking back.

blog /oct. 24, 2017

Third-Party Security is Your Security

When you must depend on third parties for a variety of products and services, it’s critical that you hold them to high security standards.

blog /oct. 17, 2017

How to Be a More Effective CISO by Aligning Your Security to the Business

Security must align to the business needs, not the other way around. Begin with investigation and understanding to be most effective.

blog /oct. 03, 2017

Proposed Legislation Calls for Cleaning Up the IoT Security Mess

Legislation is a good first step toward persuading IoT manufacturers (who want to stay in business) to do the right thing when it comes to the security of their devices.

blog /sept. 28, 2017

Phishing for Information, Part 5: How Attackers Pull It All Together, and How You Can Fight Back

Stop feeding attackers every piece of the puzzle they need to pull off their scams.

blog /sept. 26, 2017

Five Reasons CISOs Should Keep an Open Mind about Cryptocurrencies

Far from a dying breed, cryptocurrencies are not only evolving but being accepted in countless new markets. CISOs need to know the ins and outs, pros and cons.

blog /sept. 07, 2017

Phishing for Information, Part 4: Beware of Data Leaking Out of Your Equipment

Organizations often overlook the many ways in which their own systems put useful information right into the hands of attackers building cyber scams.

blog /août 31, 2017

Six Steps to Finding Honey in the OWASP

According to Verizon’s 2014 Data Breach Investigations Report, “Web applications remain the proverbial punching bag of the Internet.” Things haven’t improved much since then. What is it about web applications that makes them so...

blog /août 29, 2017

URL Obfuscation—Still a Phisher's Phriend

Cyber crooks use several common URL disguising techniques to trick users into thinking their sham sites are legitimate.

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.