Where does a WAF fit in the data path?

The data path contains multiple insertion points at which a WAF can be deployed. But that doesn’t mean every insertion point is a good idea.

Read More >

How Container Orchestration Environments Impact Health Monitoring

At the heart of availability is monitoring. Every load balancer – before it chooses a target resource – has to know whether that resource is actually available or not. Otherwise, what’s the point? ...

New Threat May Slip through the KRACK in BYOD Policies

Combatting this vulnerability might mean you have to force updates on employees’ personal devices or deny them access altogether.

Scary Candy Week: KRACK and ROCA

What You Need to Know and What You Need to Do – It’s not a coincidence that Halloween falls in October. We humans have a heightened fear perception this time of year; it’s some kind of vestigial...

How F5’s WAF Earned its AWS Security Competency

F5's Tom Atkins takes a closer look at the company's recently achieved AWS milestone, supporting those aiming to mitigate attacks on applications deployed in the public cloud.

Dear NetOps: Security Rule Zero Applies to You, Too

Okay, NetOps. As you’re getting all automated up and scripting your hearts out, it’s time for a gentle reminder about security. I’m not talking about firewalls and WAF or other security...

Taking Customers to the AWS Cloud, Through Our Channel

SVP of Worldwide Channels David Helfer highlights F5's selection for the AWS Channel Opportunity Registration Program and just-achieved AWS Security Competency.

Read More >

Example-driven Insecurity Illustrates Need for WAF

Learning online is big. Especially for those who self-identify as a developer. If you take a peek at Stack Overflow’s annual developer survey...

F5 BIG-IP Availability on IBM Cloud for VMware Solutions

For most enterprises, the concept of cloud is well in the process of crossing the “chasm” from early adoption to early majority.

Automation: Managing F5 BIG-IP Configurations Using Puppet

Most of us are still learning new ways to optimize continuous deployments and reduce release cycles. In complex environments this often includes automating, streamlining, and eliminating costly,...

Read More >

The Good News about Breaches

Security breaches in the news serve as a good reminder to check and make sure you have a solid application protection strategy in place, starting with never trusting user input.

Making Multi-Cloud Manageable: F5 Application Connector Now Available for Microsoft Azure

When using multiple public clouds to host applications, you’ve still got to manage those apps and connect them to a secure inbound path.

F5 Names Steve McMillan as Head of Global Services

F5 Networks (NASDAQ: FFIV) today announced the addition of Steve McMillan to its leadership team as Executive Vice President of Global Services, reporting to the CEO. In this role,...

Bots are the Bane of Turing Security Test

Bots are cool. Bots are scary. Bots are the future. Bots are getting smarter every day. Depending on what kind of bot we’re talking about, we’re either frustrated or fascinated by them.

Open Source Spotlight: Auto Scaling Mesos

Thanks to cloud, auto scaling applications is now nearly synonymous with scalability. And until recently, auto scaling apps with Mesos was a mostly manual endeavor.

Solace and F5: Partnering for Better IoT

In addition to being equipped to handle huge numbers of devices and massive amounts of data traffic, IoT deployments have to be built for some unique ways of communicating.

Five Reasons the CISO is a Cryptocurrency Skeptic—Starting with Bitcoin

There’s a lot of hype surrounding cryptocurrencies, but what’s good for currency traders may not be great for security-minded professionals.

Reactive Security Strategy Poses Significant Challenge for CISOs

SINGAPORE – Today at Singapore International Cyber Week, F5 Networks (NASDAQ: FFIV) released a comprehensive report on the evolving nature of the CISO role and the IT security approaches...

Five Reasons CISOs Should Keep an Open Mind about Cryptocurrencies

Far from a dying breed, cryptocurrencies are not only evolving but being accepted in countless new markets. CISOs need to know the ins and outs, pros and cons.

CISOs: Striving Toward Proactive Security Strategies

As enterprises more closely align their security and IT operations, they still struggle to shift their security programs from reactive to proactive.

Ceding Control of IoT for the Sake of Security

We are, I think it’s safe to say, universally delighted by technology. The mundane is transformed into the magical by the mere introduction of technology. The novelty wears off after a time, of...

Read More >

Vulnerable Stuff Running in Containers Still Vulnerable Stuff

It has been said – and not just by me – that encrypted malicious code is still malicious code. The encryption does nothing to change that...

WireX Android DDoS Malware Adds UDP Flood

As quickly as attackers commandeer IoT devices to build more “thingbots,” they continue to evolve their attack types and functionality.

AnsibleFest 2017’s Code of Conduct as a Metaphor for DevOps

The Ansible community requires everyone to be nice to each other, to be empathetic and to be kind. This is best evidenced by the Ansible Code of Conduct for events. One excerpt: “Ansible is...

Successful Cloud Migrations: Making the Leap

F5 SVP Calvin Rowland walks you through the mindset of moving to the cloud, with a nod to just announced IBM/VMware/F5 solutions.

AnsibleFest and the Rise of Network Automation

Over the past year, F5 and Ansible have been working hard to bring network automation solutions to our customers. In successive releases, Ansible has introduced more and more network automation...

The Dawn of Cloud Arbitrage: Equinix Builds and F5 helps Pave the Way

Along with their just-opened San Jose data center, Equinix leverages F5 BIG-IP for application services to support multi-cloud interconnection.

Closing Data Center Generational Gaps with NetOps

Don’t let anyone tell you hardware doesn’t matter. Hardware is everywhere. In every mobile phone. Every Fitbit and techno-gadget we own. In our cars. In our laptops and tablets. Increasingly, it’s...

New Skill and New Demands: The Private Cloud Challenge for Network Operations

Cloud adoption changes the way we deploy applications, and the way that IT fulfills its responsibility of “stopping everything breaking.”

Maslow’s Hierarchy of Automation Needs

If there’s anything hotter than containers right now, it’s probably something based on containers, like serverless. In addition to being the “cool” kid on the block right now, it’s also the focus...

Realizing Multi-Cloud Consistency with F5 and VMware Cloud on AWS

In the beginning (back in 2007 or so), there was cloud. And it was mostly SaaS, as organizations eagerly consumed business-ready offerings that replaced previously rented line of business apps...

Forget the kids. We need this for IT Automation.

To untangle the complexity inherent in IT automation today, we need to find a better way to construct the workflows that represent the processes used to deploy, manage, and configure IT...

Read More >

F5 Named a Leader in Gartner Magic Quadrant for Web Application Firewalls

SEATTLE – F5 Networks (NASDAQ: FFIV) today announced that it has been positioned by Gartner, Inc. in the Leaders quadrant of its Magic Quadrant for Web Application...

Read More >

SovLabs and F5 BIG-IP accelerate application delivery for VMware vRealize Automation customers

F5 SVP Calvin Rowland: "With SovLabs, customers are able to configure and deploy BIG-IP services directly from vRealize Automation. This innovative approach helps to bridge NetOps and...

F5 Availability in the AWS GovCloud Marketplace!

It’s no secret that security is the leading concern for the majority of public cloud users, but for some organizations and government agencies, it is even more paramount. For these groups, highly...

Treat Your IT Automation Code Like Cattle, Too.

IT has to embrace standardization of the code that makes IT go or risk creating systems that syphon off the financial and efficacy benefits of IT automation. I spent nearly a decade developing...

Cry “Havoc” and Let Loose the Thingbots of War!

Gray hats might have good intentions launching their “vigilante” botnets, but are they really helping us win the war against Death Star-sized thingbots?

F5 Container Connector: Now with Ingress Control, Red Hat OpenShift, and Pivotal Cloud Foundry

If you haven’t noticed, containers are continuing to build momentum with a surprising speed. Not even cloud can brag of this kind of zealous adoption. While it’s important to remember that...

Hoisted by Our Own Petards: Big Dirty Data

Big data. Petabytes generated on an hourly basis for millions of sensors and monitors embedded in things across the business value chain. From manufacturing to delivery, from POS to consumers, data...

Ingress Controllers: New Name, Familiar Function

Colloquialisms. These are those words and phrases that have a uniquely local meaning that can confound those not native to the area. For example, when I’m out and about and thirsty, I look for a...

The Hunt for IoT: The Rise of Thingbots

With “thingbots” now launching Death Star-sized DDoS attacks, hosting banking trojans, and causing physical destruction, all signs are pointing to them becoming the attacker infrastructure of the...

Premier Management Company Secures Healthcare Data with F5 Cloud-Based WAF

Using an F5 security solution in the Microsoft Azure cloud, the organization protected its data and ensured compliance with a scalable web application firewall.

Report: IoT attacks exploded by 280% in the first half of 2017

To assess the current state of IoT threats, F5 Labs released its global threat report—The Hunt for IoT Vol. 3: The Rise of Thingbots—which examined how attackers have developed botnets to target...

Programmable Proxies are the Duct Tape of the Internet

Programmable proxies protect ports from predators – like those targeting SMB today.   When the Internet was in its infancy, my oldest three children were teenagers. Even then – with a far...

Lessons from Togo: What F5’s new CEO learned about business and life growing up in Africa

F5 CEO François Locoh-Donou sits down with GeekWire to discuss his background, encouraging young Africans to study technology and become entrepreneurs, and cashew farming. August 11, 2017 —...

Was DC25 My Last DEF CON?

F5's David Holmes looks back at the recently concluded DC25 and ponders future attendance.

"Shadow #cloud apps pose unseen risks" featuring @dholmesf5: https://t.co/VFx6Sm6XJ6 via @networks_asia
2 hours ago

"6 steps to #DevOps success": https://t.co/tOy0IdUd25 via @CIOonline
4 hours ago

RT @F5Security: "Scary Candy Week: #KRACK and #ROCA" by @dholmesf5: https://t.co/vJI0dcYlkP #SSL https://t.co/P99jYMBrnF
6 hours ago

"Sharding for Scale: Architecture matters" by @lmacvittie: https://t.co/sK5zyLZlAm via @devopsdotcom #DevOps https://t.co/ntmU2FYwkX
6 hours ago

The evolution of application delivery controllers: https://t.co/Vp7LDbx2m0 #whitepaper https://t.co/4E1nfvm74y
8 hours ago

Is there a silver lining to data breaches? Read @lmacvittie's blog on @F5Labs to find out: https://t.co/1Qn0sKXAmDhttps://t.co/MgyoPZXjKt
10 hours ago

Read what others who built in the #cloud would do differently: https://t.co/YDInYOdZtV #wemakeappsgo https://t.co/Y3Cgy8f11h
12 hours ago

"Proxy models in #container environments" by @lmacvittie: https://t.co/vP9aiSk7Ry via @devcentral #DevOps https://t.co/MMoDAoeTri
14 hours ago

"Shadow #cloud apps pose unseen risks" featuring @F5Security's @dholmesf5: https://t.co/CMPuJChM4T via @ITworld https://t.co/Rpud3vwAbw
16 hours ago

"10 pieces of tech in your office that can be replaced by your smartphone": https://t.co/geDnnC2ndD via @TechRepublic
1 day ago

"The forgotten women who helped create the field of #cybersecurity": https://t.co/LAYB8inDh2 via @TIME
1 day ago

[#Whitepaper] Distributing applications for disaster planning and availability: https://t.co/TYqAAKMUlM #DDoS https://t.co/DOD6SYx9uE
1 day ago

.@F5Security offers security policies that scale, discover the right solution for your enterprise:… https://t.co/VguWOR4xyv
1 day ago

"Vulnerable stuff running in #containers still vulnerable stuff" by @lmacvittie: https://t.co/Vy2TmyWzqB #DevOps… https://t.co/elsEQozNkO
1 day ago

Register now for today's #multicloud webinar, starting at 11 a.m. PT! https://t.co/uDmn4Ue08w #cloud https://t.co/U0umC92DiC
1 day ago

RT @F5Security: "New threat may slip through the #KRACK in #BYOD policies" by @lmacvittie: https://t.co/f1gtXlIFja via @F5Labs https://t.co/ZlMvzwBXUI
1 day ago

"Enterprise architecture and business planning: now joined at the hip" https://t.co/Lz66Qjurbp via @ZDNet #cloud
1 day ago

"#Hackers exploit security #KRACK in wifi – and no device is safe" featuring F5's @TristLiverpool:… https://t.co/XjuxtpcTqj
1 day ago

"These common email mistakes are ruining your credibility": https://t.co/QoVwa7nxq9 via @FastCompany
2 days ago

"IT budgets set to grow in 2018, driven by #AI, #IoT, #VR adoption": https://t.co/3R53LvtGb8 via @TechRepublic
2 days ago