CONTRIBUTOR DEBBIE WALKOWSKI

blog /11月 07, 2017

What Happens to Encryption in a Post-Quantum Computing World?

As the possibility of quantum computing draws nearer, changes to today’s TLS key exchange algorithms will be required.

blog /10月 19, 2017

Interview with the Experts: The Future of IoT Security through the Eyes of F5 Threat Researchers

When it comes to IoT threats, we’re nowhere near being out of the woods yet; we’ve just barely entered the forest.

article /10月 23, 2016

DARPA Proves Automated Systems Can Detect, Patch Software Flaws at Machine Speed

According to DARPA, it takes an average of 312 days for security pros to discover software vulnerabilities such as viruses, malware, and other attacks. In hacker time, that’s a virtual eternity in which bad actors can wreak havoc.

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.