Dec 26, 2017 (MODIFIED: Jan 12, 2018)
In Part 5 of this blog series, we use inversion modeling techniques to develop a high-level protection strategy.
Nov 28, 2017 (MODIFIED: Jan 02, 2018)
In Part 3 of this blog series, we demonstrated modeling the threat landscape along with executive threat-modeling. In this blog, we discuss the importance of defining controls.
Nov 14, 2017 (MODIFIED: Dec 26, 2017)
Mike Levin, Center for Information Security Awareness
CISOs who fail to prioritize security awareness training are putting their business and assets at serious risk.
Nov 09, 2017 (MODIFIED: Dec 19, 2017)
Proposed legislation could change existing laws that bars victims of hacking attacks from striking back.
Oct 17, 2017 (MODIFIED: Nov 28, 2017)
Security must align to the business needs, not the other way around. Begin with investigation and understanding to be most effective.
Aug 31, 2017 (MODIFIED: Oct 17, 2017)
According to Verizon’s 2014 Data Breach Investigations Report, “Web applications remain the proverbial punching bag of the Internet.” Things haven’t improved much since then.
What is it about web applications that makes them so...
Aug 23, 2017 (MODIFIED: Oct 10, 2017)
How InfoSec leaders can build successful threat models by defining the threat landscape and its component resources, then asking simple, situational questions.
Jul 25, 2017 (MODIFIED: Nov 10, 2017)
Protecting our critical infrastructure is everyone’s responsibility, and there are many ways we can all do our part.
Jun 22, 2017 (MODIFIED: Aug 03, 2017)
Understanding the customer segment of your organization is critical to developing a strategy that ensures regulatory compliance.
May 04, 2017 (MODIFIED: Jul 18, 2017)
Information modeling blends lateral thinking and deductive logic. Applied to information security, it’s a powerful technique for designing a security architecture with multi-dimensional controls that minimizes risk and achieves continuous compliance.
Apr 28, 2017 (MODIFIED: Jul 06, 2017)
When you feel like you’re losing the security battle, try one, a few, or all of these tips to re-invigorate your program and stay on a positive track.
Feb 23, 2017 (MODIFIED: Jul 06, 2017)
When security solutions don’t work as planned, embrace the complexity and use Systems Theory tools to adjust, regulate, and redefine.
Jan 18, 2017 (MODIFIED: Jul 06, 2017)
I’ve mentioned before how important strong risk management is to a CISO. When it comes to risk, the applications our users depend on are a big concern. In F5's 2016 State of Application Security survey, a majority of respondents cited security around applications as an area of great concern.
Get the latest application threat intelligence from F5 Labs.
Follow us on social media.