Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


Entries for 'Nick B'

articlescaleoptimisemonetise March 04, 2014 by Nick B
In recent blog posts by my colleague Lenny Burakovsky, the issues facing service providers (SPs) around mobile security were discussed. It’s something we’re speaking to operators about a lot as we help them figure out how to address the inherent security weaknesses in 4G networks. F5 followers will know that at the end of last year we announced our new Synthesis architecture, to promote the delivery and orchestration of software defined application services (SDAS) throughout data centre, cloud...
Like every other tech company with an interest in the mobile industry, we’ve been looking forward to Mobile World Congress this week. Yes, it’s incredibly tiring and most people have had enough of the Fira after the week’s over, but it’s a fantastic event. After a somewhat quieter show last year in terms of new launches, we can’t wait to see a few flagship devices and announcements in Barcelona. But while the unveilings of Microsoft’s first Android phone and Mark Zuckerberg’s call for free Int...
A recent report from Gartner claimed that half of large enterprises will be using hybrid cloud computing, a combination of external cloud computing and in-house management, by 2017. The report from Gartner, covered here (http://www.computerweekly.com/news/2240206459/Half-of-large-enterprises-will-have-hybrid-cloud-by-2017-says-Gartner) by Computer Weekly, says that enterprises are looking for the combination of public cloud scalability and other benefits and the security offered by running a pri...
article October 28, 2013 by Nick B
Did you think you were just getting used to BYOD and juggling the benefits it brings with the security risks it also entails? Well, get ready, because there is another Bring Your Own phenomenon on the way, and it will potentially bring more headaches to already stressed out IT departments. The new phenomenon is Bring Your Own Network (BYON). This is, as the name suggests, when employees use their mobile phone’s cellular connectivity to set up a personal hotspot. This means they can, ...
articleaccesssecurityapplicationuser October 14, 2013 by Nick B
There is no longer any point in thinking of security in terms of a static corporate perimeter accessed by known, controlled devices. Now, we must be user and app centric in our thinking. The shifting corporate perimeter has come about for a number of reasons. One is the drive to deploy applications in the cloud, and have them be fast, available and also secure. Another is that users are more in control of their destiny than ever before; the consumerisation of IT that has given choice to th...
articlesecurityspamhaus October 09, 2013 by Nick B
Back in April, we conducted a survey about DDoS and DNS reflection attacks following the now legendary Spamhaus attack, the largest attack of its kind. The results were fascinating; very few (10 per cent) of the people we spoke to were able to describe a DNS reflection attack and only 11 per cent were confident that their day-to-day business operations would not be affected by a DDoS attack on their systems. In late September, at Gartner’s Security and Risk Management Summit in London, we survey...
articlesecuritymanagement September 18, 2013 by Nick B
#GartnerSEC on Twitter, for those that are interested.  F5 are present as one of the top tier sponsors at this conference, aimed at senior level IT security executives.  Around 450 people are expected to attend.  Major themes thus far – admittedly I write this at mid-morning on day one of two – seem to be fraud detection, managing mobile devices (again – a big topic last year also) and DDoS protection to a lesser extent.    Associated with the event, F5 are offeri...
articleaccesssecurity September 16, 2013 by Nick B
You’re probably getting tired of hearing experts bang on about ever-evolving security threats and the need for the security industry to keep up with them. But there is a reason we bang on about them: we need to. Let’s look at some of the big stories dominating the security world recently: • Someone with “insider knowledge” of Vodafone Germany’s IT system hacks a database and steals names, addresses, dates of birth and limited banking details of around 2 million customers • The on-going revelat...
Ah, cloud computing. It now seems firmly entrenched in enterprises across the world but it’s fair to say it has been a bumpy ride to get there. The benefits of cloud computing have been questioned by those worried about its security, whether it is actually cheaper long-term, whether it meets regulations in certain geographies and whether it represents a loss of control of an organisation’s data. There is another issue that seems to be causing a few headaches for some, and that is a lack of a cle...
With the move towards 4G and LTE, many consumers have been unaware of the network risks that could slip into the mobile networks that they use every day. Mobile operators on the other hand are quite rightly concerned that the transition to IP based networks could open them up to a variety of attack vectors never experienced before by the industry. The rise of always-connected smart devices and the proliferation of mobile applications have led to increased demands around performance and scale,...
Page 1 of 6First   Previous   [1]  2  3  4  5  6  Next   Last