CONTRIBUTOR RAY POMPON

blog / 3 20, 2017

Can Audits Help Us Trust Third Parties?

Organizations who outsource need to measure the risk of entrusting their data to someone else. They aren’t easy or cheap, but audits are really the best tool we have.

blog / 3 13, 2017 (MODIFIED: 3 20, 2017)

Will Deception as a Defense Become Mainstream?

Defensive deception works well, but needs championing before we’ll see it as a best practice or compliance requirement.

article / 3 10, 2017 (MODIFIED: 3 20, 2017)

DNS Is Still the Achilles’ Heel of the Internet

Since the Internet can’t survive without DNS, let’s make our best effort to defend it.

blog / 2 23, 2017 (MODIFIED: 3 20, 2017)

Building Secure Solutions Successfully Using Systems Theory

When security solutions don’t work as planned, embrace the complexity and use Systems Theory tools to adjust, regulate, and redefine.

blog / 2 14, 2017 (MODIFIED: 3 20, 2017)

The Conflicting Obligations of a Security Leader

Faced with competing pressures, CISOs are ultimately the experts at assessing what’s truly at stake in their organizations.

blog / 2 09, 2017 (MODIFIED: 3 03, 2017)

The Risk Pivot: Succeeding with Business Leadership by Quantifying...

Getting the security investments you need often comes down to making your case to management in terms of operational risk.

report / 1 26, 2017 (MODIFIED: 2 22, 2017)

Using F5 Labs Application Threat Intelligence

As security professionals, we often feel like we’re fighting a losing battle when it comes to cyber security.

blog / 1 23, 2017 (MODIFIED: 2 27, 2017)

The Humanization of the Security Leader: What CISOs Need to Be Successful

When someone from the IT group gets promoted into security management, a common first lesson is that “geek culture” is ineffective in the boardroom. Just watch one episode of The Big Bang Theory and you’ll recognize the classic nerd character...

blog / 1 17, 2017 (MODIFIED: 3 03, 2017)

IoT Threats: A First Step into a Much Larger World of Mayhem

So far, we’ve seen IoT DDoS attacks on a Death Star scale. What's next for those of us that may be caught in the blast?

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.