CONTRIBUTOR RAY POMPON

blog /5月 02, 2018

Breach Costs Are Rising with the Prevalence of Lawsuits

When it comes to tallying the total cost of a data breach, lawsuits figure prominently, alongside repair costs, loss of reputation and sales, compliance penalties, and operational downtime.

blog /4月 26, 2018

How Secure Are Your Third-Party Web Apps?

You can’t assume that your third-party web apps are secure! You need to assess them yourself using this multi-step process.

blog /4月 17, 2018

Extend Your Security Program’s Influence with Adjuvants

Savvy CISOs don’t go it alone; they rely on in-house collaborators (outside of the security team) to help achieve the organization’s security objectives.

blog /4月 10, 2018

Know the Risks to Your Critical Apps and Defend Against Them

Critical apps are the ones that must never go down or be hacked. They are also the hardest to defend because they are often massive, ancient, and touch everything.

blog /3月 22, 2018

When Information Security is a Matter of Public Safety

Seven steps for improving the security of critical infrastructure systems—and protecting the public from unnecessary risk.

blog /2月 06, 2018

CISOs Look to Machine Learning to Augment Security Staffing Shortages

As security expertise becomes more scarce, CISOs are turning to machine learning to do more with fewer people.

blog /1月 24, 2018

Risk vs. Reality: Don’t Solve the Wrong Problem

If you’re not evaluating risk in terms of likelihood and impact, you could be focusing your security efforts in all the wrong places.

blog /1月 09, 2018

Global Consultancy Overcomes Cloud Security Risks

How moving application into the cloud can make your organization stronger and more valuable to your customers.

blog /1月 02, 2018

Liability in an Assume Breach World

The safest way to run a network is to assume it’s going to breached, but that also means minimizing your liability and ensuring the executive team is fully aware of what is going on.

report /12月 07, 2017

Lessons Learned from a Decade of Data Breaches

F5 Labs researched 433 breach cases spanning 12 years, 37 industries, and 27 countries to discover patterns in the initial attacks that lead to the breach.

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.