report / Jan 19, 2017
In just four short years, encryption estimates have gone from almost non-existent (in the low single digits before 2013) to just over 50% by the end of 2016. How much of a victory is this?
article / Feb 13, 2017
blog / Feb 09, 2017
blog / Feb 02, 2017
blog / Jan 18, 2017
I’ve mentioned before how important strong risk management is to a CISO. When it comes to risk, the applications our users de...
report / Jan 26, 2017
As security professionals, we often feel like we’re fighting a losing battle when it comes to cyber security.
quarterly report / Oct 08, 2016
The latest evolution of cyber weapons is brought to you by the default passwords in Internet of Things (IoT) devices.
article / Oct 06, 2016
The Mirai botnet has infected hundreds of thousands of Internet of Things (IoT) devices, specifically security cameras, by us...
blog / Jan 17, 2017
So far, we’ve seen IoT DDoS attacks on a Death Star scale. What's next for those of us that may be caught in the blast?...
article / Oct 23, 2016
According to DARPA, it takes an average of 312 days for security pros to discove...
in Telnet scans to grow IoT botnets
Spy vs. spy. Use threat intelligence to thwart attacks
TLS and other global encryption trends are advancing
Follow @f5labs for the latest application threat research.
Get the latest application threat intelligence on LinkedIn.