CONTRIBUTOR RAY POMPON

blog / mars 24, 2017

Cyber Insurance: Read the Fine Print!

Purchasing cyber insurance can be useful, but claims are often denied due to policy exclusions or lapses in controls.

blog / mars 20, 2017

Can Audits Help Us Trust Third Parties?

Organizations who outsource need to measure the risk of entrusting their data to someone else. They aren’t easy or cheap, but audits are really the best tool we have.

blog / mars 13, 2017 (MODIFIED: mars 20, 2017)

Will Deception as a Defense Become Mainstream?

Defensive deception works well, but needs championing before we’ll see it as a best practice or compliance requirement.

article / mars 10, 2017 (MODIFIED: mars 24, 2017)

DNS Is Still the Achilles’ Heel of the Internet

Since the Internet can’t survive without DNS, let’s make our best effort to defend it.

blog / févr. 23, 2017 (MODIFIED: mars 20, 2017)

Building Secure Solutions Successfully Using Systems Theory

When security solutions don’t work as planned, embrace the complexity and use Systems Theory tools to adjust, regulate, and redefine.

blog / févr. 14, 2017 (MODIFIED: mars 20, 2017)

The Conflicting Obligations of a Security Leader

Faced with competing pressures, CISOs are ultimately the experts at assessing what’s truly at stake in their organizations.

blog / févr. 09, 2017 (MODIFIED: mars 03, 2017)

The Risk Pivot: Succeeding with Business Leadership by Quantifying...

Getting the security investments you need often comes down to making your case to management in terms of operational risk.

report / janv. 26, 2017 (MODIFIED: févr. 22, 2017)

Using F5 Labs Application Threat Intelligence

As security professionals, we often feel like we’re fighting a losing battle when it comes to cyber security.

blog / janv. 23, 2017 (MODIFIED: févr. 27, 2017)

The Humanization of the Security Leader: What CISOs Need to Be Successful

When someone from the IT group gets promoted into security management, a common first lesson is that “geek culture” is ineffective in the boardroom. Just watch one episode of The Big Bang Theory and you’ll recognize the classic nerd character...

blog / janv. 17, 2017 (MODIFIED: mars 03, 2017)

IoT Threats: A First Step into a Much Larger World of Mayhem

So far, we’ve seen IoT DDoS attacks on a Death Star scale. What's next for those of us that may be caught in the blast?

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.