Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


Entries for 'David Holmes'

articlesecurity April 16, 2014 by David Holmes
I just spent the last two days writing “business-friendly” copy about Heartbleed. I think the result was pretty good and hey, it even got on the front page of f5.com so I guess I got that going for me. Then I wrote up some media stuff and sales stuff and blah, blah blah. But what I really wanted was to do talk tech. So let’s go! What’s Wrong with OpenSSL? The Heartbleed vulnerability only affects systems derived from, or using, the OpenSSL library. I have experience with the OpenSSL library. As...
article March 07, 2014 by David Holmes
that went unsung at #RSAC 2014. There’s lots of new security stuff in BIG-IP that shouldn’t be overlooked amidst all the press releases and hoopla at #RSAC 2014. Don’t get me wrong, hoopla has its place: for example, the banking community is excited about the new anti-fraud thing we bought. And Pete Silva’s video interview of Joel Moses for the new Secure Web Gateway forward proxy is great. But the features I’m talking about are too low-level to warrant a pres...
articlesecurityf5soc February 21, 2014 by David Holmes
The F5 Security Operation Center In 2013, F5 Networks acquired the security company Versafe, the developer of an online banking anti-fraud solution that fit neatly into F5’s security story. An additional asset gained from the acquisition was the Versafe security operations center (SOC). The SOC works with customers and end-users to analyze malicious software, from which it publishes periodic threat intelligence based on those analyses. The SOC report for January 2014 provides an anal...
articlesecurity February 19, 2014 by David Holmes
Everyone who is anyone in #infosec will be at the RSA 2014 conference next week, right? That is, unless they are the counterculture conference held by the new rebel alliance but that’s a whole other story. But either way, you’ll be there in San Francisco. F5 is showing live demonstrations of new security solutions at the booth. We’re hoping that these show the depth of our dedication to helping to protect our customers and their businesses. Four live Security Demonstrations! High-performance ...
article February 15, 2014 by David Holmes
You’re on the road and to keep yourself company, you’ve just bought season four of Downton Abbey. You can’t wait to see how the family and staff will recover from that crisis at the end of season three.Tonight your hotel has a name that starts with an ‘M’ and ends in a ‘t’. You dig around in your backpack for your trusty micro HDMI cable. You plug one end of the cable into your laptop and the other into the variable media port box. But nothing happens. Your laptop sees the television, but t...
article January 09, 2014 by David Holmes
For much of 2013 I was F5’s security evangelist. It’s a fun title and a very interesting role. To those outside the tech industry, or even those outside the security industry, the role can require some explanation. So what does a Security Evangelist do? Instead of trying to explain it, perhaps it’s easier to see what kept me busy during 2013. Spoke at 8 conferences. Giving a talk at RSA Europe in Amsterdam was a professional highlight for 2013. I had been preparing fo...
articlesecurityddos December 23, 2013 by David Holmes
It’s still #ddos season, so let’s take another look at the F5 reference architecture around DDoS protection. The second deployment scenario is the enterprise use case, which has lots of inbound application traffic but also some measure of outbound user-generated traffic as well. Differences between the Enterprise and Global FSI use cases: In the network diagram product map above, at the top right you can see the user-generated traffic issuing from the green user icon. It flows through a next ...
articlesecurityddos December 12, 2013 by David Holmes
“Is it possible to quantify your own security posture as it relates to denial-of-service? “ That’s the question a customer of ours has been asking themselves, and they came up with plan to measure exactly that. They’re going to DDoS their own production systems. I absolutely love this plan, and admire the architects for their foresight. When done properly, a self-DDoS test can help you test the following: The resilience of your network and services The...
articlesecurityddos December 05, 2013 by David Holmes
#ddos Did you ever see that movie with George Clooney – Up in the Air? His life consists mostly of travel and somehow he logs 10 million miles (domestically!). I remember a line from the movie where he is giving a talk and he says that he travels 350,000 miles per year. Compare that to the moon, which is 250,000 miles away. I love that movie because that’s basically been my life, too. I’ve flown nearly 300,000 miles over two years. Most of that travel has been visit to high-...
articlesecurity November 25, 2013 by David Holmes
So I’m sitting here waiting while a batch of The Jester’s cupcakes is baking. Oh, you didn’t know that the famed Patriot Hacker had skills beyond DoSing the Westboro Baptists and hacking Anonymous? Well, we’ll find out in a few minutes if he’s a decent baker, too. Here’s his recipe for spiced holiday cupcakes with vegan (?) cream cheese. The cupcakes remind me that this coming week includes not just the American holiday, Thanksgiving, but also Black Friday, one of the busiest shopping days of...
Page 1 of 7First   Previous   [1]  2  3  4  5  6  7  Next   Last