CONTRIBUTOR SARA BODDY

blog / 3 30, 2017 (MODIFIED: 4 14, 2017)

How to Talk Cyber Risk with Executives

Board level interest in your cyber risk posture is growing, in fact it might be required soon for publicly traded companies. Presenting cyber risk to your board – effectively – means talking in their terms.

blog / 3 24, 2017 (MODIFIED: 4 14, 2017)

Cyber Insurance: Read the Fine Print!

Purchasing cyber insurance can be useful, but claims are often denied due to policy exclusions or lapses in controls.

blog / 3 03, 2017 (MODIFIED: 3 29, 2017)

Why Managing Low-Severity Vulnerabilities Can’t Be Just a Pipe Dream

Putting off fixing low-severity vulnerabilities can have high-impact effects.

report / 1 26, 2017 (MODIFIED: 4 07, 2017)

Using F5 Labs Application Threat Intelligence

As security professionals, we often feel like we’re fighting a losing battle when it comes to cyber security.

quarterly report / 10 08, 2016 (MODIFIED: 3 30, 2017)

DDoS's Newest Minions: IoT Devices (Volume 1)

The latest evolution of cyber weapons is brought to you by the default passwords in Internet of Things (IoT) devices.

article / 7 22, 2016 (MODIFIED: 3 03, 2017)

Web Injection Threats: The Cost of Community Engagement on Your Site

Customer engagement drives web application design, but user-generated content brings inherent security challenges.

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.