/1 16, 2018
Forty-three percent of organizations say security is essential when deploying apps, and more than two thirds use multiple security solutions to protect clients, infrastructure, and web apps.
/1 10, 2018
Every week another bug, vulnerability, or exploit is released - we need a multi-layered security strategy (beyond our standard patch “spin cycles”) to deal with threats like Spectre and Meltdown.
/12 14, 2017
With billions of data records compromised, it’s time to reconsider whether passwords are our best means for authenticating users.
/11 21, 2017
Seriously, how many colors are there? And how many of us share the same love of one of those limited choices?
/10 24, 2017
Assessing the State of Application Delivery depends on getting information from you about your applications!
/10 17, 2017
Combating this vulnerability might mean you have to force updates on employees’ personal devices or deny them access altogether.
/10 04, 2017
Security breaches in the news serve as a good reminder to check and make sure you have a solid application protection strategy in place, starting with never trusting user input.
/8 17, 2017
Gray hats might have good intentions launching their “vigilante” botnets, but are they really helping us win the war against Death Star-sized thingbots?
/6 06, 2017
Providers and manufacturers could go a long way toward reducing the very real threat of IoT.
/5 18, 2017
Cloud sprawl isn’t just a budget sinkhole; it’s quickly becoming a security blind spot and potential attack vector for data theft.
/4 25, 2017
Even URLs that look legitimate can be fake, so train, train, train your users to verify links before they click.
/3 09, 2017
If you’re running Apache Struts 2 and the vulnerable component, stop reading and update now.
/3 03, 2017
Speed to market means IoT and mobile apps are being released with known vulnerabilities.
/2 24, 2017
Definitive steps individuals and organizations can take today to deal with the impact of Cloudbleed.
/2 02, 2017
Nearly 200,000 servers are still vulnerable to Heartbleed—and the organizations who own them might surprise you.
/1 19, 2017
One of the pillars of DevOps is automation. Along with that comes orchestration, which some might guess to be automation at a higher level of abstraction.
/11 14, 2016
We’ve all seen after-the-fact security camera footage of a wide variety of crimes splashed across social media and news sites. This visibility is a critical component of any judicial system, as it helps identify who did what and provides crucial, objective evidence of what actually happened.
/10 04, 2016
What's the other half? And why don't organizations just find and fix their own bugs?
/8 12, 2016
HEIST is an example of how risk and threat are different, and why the distinction matters.
Get the latest application threat intelligence from F5 Labs.
Follow us on social media.