You Never Know When...

Posted April 28, 2016 by Peter Silva

An old article gets new life. #TBT Back in 2012 I wrote an article titled Bait Phone. It was about cops dropping mobile phones with a tracking device and following the stealing culprit for an arrest. Like Bait Car but with a smartphone. Over the... Read more

The Importance of Licensing to Equalize Dev and Production

Posted April 28, 2016 by Lori MacVittie

We’re all aware that dev/test != production environments. While the software stacks upon which applications are deployed may be (and hopefully are) the same, there still remains a whole lot of “infrastructure” (that’s everything else) that isn’t... Read more

F5 Agility - Welcome to 'The City of Dreams'

Posted April 28, 2016 by Neil Jaques

This year, Vienna hosts F5 Agility. In advance of the event, we take a look at the hot spots and hidden gems of Austria's capital. Read more

Lightboard Lessons: The BIG-IP ASM and WhiteHat Integration

Posted April 27, 2016 by John Wagnon

Today’s web applications are under constant attack, and it’s critical to keep those applications secure at all times.  One of the best ways to keep your applications secure is to protect them with a Web Application Firewall (WAF) and also... Read more

Technical Article

The Dangerous Game of DNS

Posted April 26, 2016 by Peter Silva

The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all... Read more

Dridex Malware – New Week, New Targets

Posted April 26, 2016 by Doron Voolf

Our ongoing campaign analysis has revealed that Dridex malware’s latest campaign focus has strongly shifted in recent months from U.K. banks, which had been the main targets previously, to US banks today. Dridex and its latest trends are... Read more

Technical Article

A Catch from the Codeshare: Removing iRules from Multiple Virtual Servers

Posted April 25, 2016 by Jason Rahm

In this episode of A Catch from the Codeshare, Jason highlights a tmsh script from community member Kai that removes a specified iRule from any virtual servers from which it is applied. Read more

The Anatomy of an Attack: Live Webinar

Posted April 25, 2016 by John Wagnon

Have you ever wondered how some of the most prevalent web application attacks are actually executed in real life?  Join us on Thursday, April 28 @ 10:00 Pacific as F5's security expert David Holmes showcases the details of some... Read more

Answers / discussion