If you haven’t noticed, containers are continuing to build momentum with a surprising speed. Not even cloud can brag of this kind of zealous adoption. While it’s important to remember that...
Programmable proxies protect ports from predators – like those targeting SMB today. When the Internet was in its infancy, my oldest three children were teenagers. Even then – with a far...
To assess the current state of IoT threats, F5 Labs released its global threat report—The Hunt for IoT Vol. 3: The Rise of Thingbots—which examined how attackers have developed botnets to target...
SEATTLE – F5 Networks (NASDAQ: FFIV) today announced that it has been positioned by Gartner, Inc. in the Leaders quadrant of its Magic Quadrant for Web Application...
Colloquialisms. These are those words and phrases that have a uniquely local meaning that can confound those not native to the area. For example, when I’m out and about and thirsty, I look for a...
F5 CEO Francois Locoh-Donou sits down with GeekWire to discuss his background, encouraging young Africans to study technology and become entrepreneurs, and cashew farming. August 11, 2017 — GeekWire
With “thingbots” now launching Death Star-sized DDoS attacks, hosting banking trojans, and causing physical destruction, all signs are pointing to them becoming the attacker infrastructure of the...
Using an F5 security solution in the Microsoft Azure cloud, the organization protected its data and ensured compliance with a scalable web application firewall.
F5 Networks (NASDAQ: FFIV) announced the results of a recent survey comparing the views of over 850 NetOps and DevOps IT professionals on their respective disciplines and collaboration practices....
F5's David Holmes looks back at the recently concluded DC25 and ponders future attendance.
There are two sides to every coin, so the old adage goes. It goes without saying that both sides of the coin are the same color even if they bear different images. So we discovered when...
Much is made of the archetypical relationship between DevOps and NetOps. We are constantly barraged with a litany of “us versus them” rhetoric that pits the one against the other...
In January of 2017, the very popular MongoDB suffered what seems to be becoming a fairly predictable tactic for attackers: taking data hostage. Subsequent investigation noted that for the most...
This series explores how InfoSec practitioners can use math, technology, and critical thinking to mitigate risk in a world where networks and data have surpassed the scope of human comprehension.
F5's principal threat research evangelist puts on his reporter hat to bring you some insights from one of the oldest hacker conferences there is.
The slow but steady migration to cloud-based environments has had an impact on many aspects of IT. One we rarely make mention of is administration. But we should.
Securing your data and infrastructure while transitioning to cloud (and software-defined everything) is complicated, but throw in tighter, stricter regulatory compliance and then you really have...
While apps represent opportunities to improve productivity and increase profits, poor performance and annoyed users bring these gains to a halt.
You’re going to need a platform for automation and orchestration. Serverless might be just what you were looking for. Serverless (a.k.a. Function as a Service) is still very much in its infancy....
F5's Lee Slaughter offers his take on the 'zero trust' model, along with solutions from F5 and Google.
SVP Calvin Rowland breaks down what it means for organizations to deploy multi-cloud solutions, touching on DevOps topics as well.
F5 DevCentral's Pete Silva takes a look at tech trends thus far in 2017, with ransomeware (still) top-of-mind.
Digital transformation on the inside is integral to enabling digital transformation on the outside. One of the foundational components of internal digital transformation is automation, which relies...
Generally speaking, the use of the term “attack” has come to mean an attempt to deny service to an organization. That’s likely because the frequency and volume of DDoS attacks have had serious...
Successful private cloud adoption is not (just) about the infrastructure. It requires fundamental changes in the way your network operations work.
F5's Lori MacVittie discusses the interplay between 'big box' and 'big digital' shopping in light of an experience economy.
The industry's use of TCP has evolved (far) beyond its original intentions. Patricia Du examines the ways TCP optimization better addresses modern user behavior.
Continuous delivery is the penultimate goal of organizations’ embracing DevOps. It is not the ultimate goal, because that would continuous deployment. Much ado is made in the alleyways of DevOps...
In April 2017, Ixia used its CloudStorm 100GE Application and Security Test Load Module to run an SSL performance test on an F5 VIPRION B4450 Application Delivery Controller blade in a VIPRION...
To meet the challenges of a world where SSL is everywhere, all the time, enterprises must choose ciphers that are secure yet scalable—and deploy high performance application delivery solutions,...
F5's APAC team presents a stylized guide with tips on protecting yourself from cyber criminals and specific attacks.
Nearly one in five of report respondents have security titles. F5's David Holmes takes a closer look at what's important to them.
Today’s software-defined economy requires businesses to move faster than their competitors. Speed and agility are critical to keeping up with competitive demands for new applications, as well as...
F5's Patricia Du discusses service provider topics, including how value-added services improve the customer experience by controlling traffic based on user profiles, network policies, and...
Based in Singapore, Breeman will work with cross-functional leaders to strategically expand and evolve the F5 sales channels and alliance partner landscape.
Let’s begin slightly off-topic by discussing the world’s favorite video on-demand service, Netflix. Between 2009 and 2016, Netflix observed a staggering increase in subscribers, from 12 million to...
Then it’s too late to cajole frustrated customers to come back. They’ve already found another provider of whatever it was you were trying to sell them.
App security is a lot of things, but sometimes we need to stop and consider what it isn’t, particularly as the volume and frequency of applications developed and deployed to meet the insatiable...
"Business casual has turned work wear into a nightmare for techies" https://t.co/rRjqqybP6J via @ZDNet
1 hour ago
"What to make of enterprise IT in a digital world?" https://t.co/6aR0SDCwe2 via @CIOonline
3 hours ago
Onboarding F5 in #cloud (part 1) - Startup Scripts: https://t.co/l9mcf7PqQh via @devcentral #OpenStack @Azure https://t.co/Hzn3eYvLUb
5 hours ago
Building a smart, sustainable #cloud strategy? Download our eGuide and future-proof app delivery in the cloud:… https://t.co/WvlB0KdSiS
7 hours ago
"Where do vulnerabilities come from?" by @dunsany: https://t.co/fwabQhRlv6 via @F5Labs #CISO #Cybersecurity https://t.co/6Yx5KxJCTJ
9 hours ago
Download the complete @Gartner_inc Magic Quadrant report on Web Application Firewalls (#WAF):… https://t.co/ZLzNSakoG2
10 hours ago
"#DevOps can't happen without education": https://t.co/FDStlywShg via @InformationWeek
13 hours ago
"Technology migrations are more painful, and #cloud isn't making them any easier": https://t.co/JCtqkf0yom via @ZDNet
14 hours ago
"Prevention cheaper than cure - especially in #cybersecurity" by @F5NetworksAPJ: https://t.co/EqGQTHz5un via @BusinessTimes
1 day ago
"Help employees create knowledge — not just share it": https://t.co/zi8r5fOo1P via @HarvardBiz
1 day ago
Check out the recap and highlights from #F5Agility17 in Chicago: https://t.co/CJMDqVmqdq #TBT
1 day ago
[F5 #Container Connector] "Now with ingress control, Red Hat @openshift, and pivotal Cloud Foundry" by @lmacvittie:… https://t.co/MHaBQrBko5
1 day ago
RT @F5Labs: [Blog] "Cry 'Havoc' and let loose the Thingbots of war!" by @lmacvittie: https://t.co/sPw25yNrlg #IoT #Cybersecurity https://t.co/I0DdXzzEZV
1 day ago
Mark your calendar and register for our upcoming #cloud #security webinar: https://t.co/loe1KgkBMT https://t.co/a47m8e3UAM
1 day ago
#IoT devices are becoming the 'cyberweapon delivery system of choice' for attackers, learn why from @F5Labs:… https://t.co/yyNa8rGzFG
1 day ago
"#Cloud powers a hybrid IT and new digital existence": https://t.co/joVpPPQ14Z via @InformationWeek
1 day ago
"#DevOps and #NetOps want more collaboration and automation" by @lmacvittie: https://t.co/MH8UuQbr9A via @APMdigest #F5Agility17
1 day ago
"How Jeff Bezos' 'two pizza rule' can help you hold more productive meetings" https://t.co/h3rwffYTNc via @CNBCMakeIt
2 days ago
Back to the Newsroom Home Page