Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

What To Expect In 2017: Security In The Cloud

DevCentral examines cloud security trends for 2017 and takes a few stabs at the reality of your realistic requirements. Security is a chess board. Of the primary fundamentals in chess the King is the most valuable piece (losing the game if you lose the King) and the Queen is the most powerful piece (in terms of... Read more
0 Reviews

Security Month on DevCentral

We are always interested in security at F5, but this month we are taking it a step further and highlighting lots of great security content on DevCentral. From discussing specific F5 security technology to looking back on security trends from 2016 to looking ahead at what's to come in 2017, the month of February on DevCentral will not disappoint! Read more
Average Rating: 5.0
3 Reviews

What to Expect in 2017: Mobile Device Security

We are mobile, our devices are mobile, the networks we connect to are mobile and the applications we access are mobile. Mobility, in all its iterations, is a huge enabler and concern for enterprises and it'll only get worse as we start wearing... Read more
0 Reviews

Security Month on DevCentral: Challenge #1

As we highlight security on DevCentral this month, we wanted to pose a fun security challenge to exercise those brain cells a little bit. Today's challenge focuses on cryptography. The object of this challenge is to figure out a plaintext message given some ciphertext and clues. Read more
2 Reviews

Introducing the F5 Security Incident Response Team (F5 SIRT)

When your business is facing a security crisis, F5 has a team dedicated to helping you through it – the F5 Security Incident Response Team (SIRT). During a security incident, the F5 SIRT engages rapidly with the resources you need to respond. The F5 SIRT also evaluates potential and published vulnerabilities and provides timely alerts to help you manage risks and deploy mitigation – before an attack brings down your business. Read more
Average Rating: 5.0
3 Reviews

Abusing Open Resolvers

Open DNS resolvers can be used to recursively query authoritative name servers. In fact, a list of open resolvers can be found at http://openresolverproject.org/. Further, Network Time Protocol (NTP) servers with "monlist" enabled allow a host to query the last 600 connections who have connected to that server... Read more
0 Reviews

Encrypted malware vs. F5's full proxy architecture

Everyone knows that malware is a huge problem, and several recent studies have shown that nearly half of all malware is now encrypted. So, if all this malware is encrypted, then how do you go about finding it and stopping it if you can't even read it? Read more
1 Review

Shared Authentication Domains on BIG-IP APM

How to share an APM session across multiple access profiles. A common question for someone new to BIG-IP Access Policy Manager (APM) is how do I configure BIG-IP APM so the user only logs in once. By default, BIG-IP APM requires authentication for... Read more
0 Reviews

Encryption Basics: How RSA Works

The RSA Conference starts today in San Francisco, CA and we wanted to start off this week with a video that shows how RSA works. RSA is a public key cryptosystem that absolutely rocked the world of cryptography back in the 1970s. Maybe you've heard about RSA but you've never really understood how it works... Read more
Average Rating: 5.0
3 Reviews

Vulnérabilité Ticketbleed (CVE-2016-9244)

Le 9/02/2017, F5 Networks a publié le bulletin CVE-2016-9244 concernant une vulnérabilité dans l'implémentation de la fonction de reprise de session TLS (Session Resumption). un Virtual Server Big-IP configuré... Read more
1 Review

Security Trends in 2016: The Problem Of Ransomware

Ransomware is a specific type of malware that encrypts important information and keeps it encrypted until the ransom (typically money) has been paid. Until very recently, ransomware was not a widely-used type of malware, but it has absolutely exploded in popularity in the past few years... Read more
0 Reviews

Containers on the Rise

Insights from our 2017 State of Application Delivery survey. You can tell a lot about organizations use and adoption of technologies by how and where they want to deploy their app services. You may recall that app services is a big umbrella under... Read more
0 Reviews

Security Trends in 2016: Defending DDoS Attacks

Distributed Denial of Service (DDoS) attacks were huge in 2016, and they will likely be a tough nemesis again in 2017…and beyond!  With all the excitement and trepidation surrounding these attacks, it’s important to know how to defend against... Read more
1 Review

Lightboard Lessons: IoT on BIG-IP

As more organizations deploy IoT applications in their data centers and clouds, they're going to need their ADC to understand the unique protocols these devices use to communicate. In this Lightboard Lesson, I light up how IoT protocol MQTT... Read more
0 Reviews

Security Trends in 2016: Known Vulnerabilities Are Still Dangerous

FINISH HIM!  SSHowDowN Wins!  The proxy attack Akamai published on last October of 2016 sound like a character from Mortal Kombat. That would be a fun MK character, a little digitized malware-bot killing Sub-Zero or Goro.  In... Read more
2 Reviews

WordPress REST API Vulnerability: Violating Security’s Rule Zero

It's an API economy. If you don't have an API you're already behind. APIs are the fuel driving organizations' digital transformation. We've all heard something similar to these phrases in the past few years. And while they look... Read more
0 Reviews

APM Cookbook: Two-Factor Authentication using YubiKey OTP with iRulesLX.

It’s been a number of years since I penned my first DC article: Two-Factor Authentication using YubiKey, YubiCloud and APM. A lot has changed over the years, BIG-IP versions and features, new YubiKey models and the YubiCloud Validation... Read more
Average Rating: 5.0
4 Reviews

Security Trends in 2016: Securing the Internet of Things

Whenever you connect anything to the internet, there is risk involved. Just ask the millions of IoT zombies infected with Mirai. Sure, there have been various stories over the years about hacking thermostats, refrigerators, cameras, pacemakers,... Read more
0 Reviews

Security Trends in 2016: Pervasive Insecurity

The term pervasive insecurity can be applied to arrays of complex systems including poverty, political landscapes, or civil violence. It's aptly suited for defining any widespread and unwelcome instability of standardized governance(1).... Read more
2 Reviews

WordPress Content Injection Vulnerability - ASM Mitigation

Last week, a critical vulnerability has been detected in WordPress 4.7 by Sucuri researchers: https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html The vulnerability allows unauthenticated attackers to change the... Read more
1 Review

Enabling Azure Active Directory Tenant Restrictions with F5

Microsoft’s Azure Active Directory(Azure AD) is the largest cloud-based enterprise directory in the world.  According to the data presented at the Microsoft Ignite conference, it has more than 750 million user accounts and handles more than... Read more
Average Rating: 5.0
4 Reviews

Getting Started with AFM

The BIG-IP Advanced Firewall Manager (AFM) is a high-performance, stateful, full-proxy network firewall designed to guard against incoming threats that enter the network on the most widely deployed protocols. It’s an industry leader in network... Read more
Average Rating: 5.0
3 Reviews

The BIG-IP Application Security Manager Part 1: What is the ASM?

This article series was written a while back, but we are re-introducing it as a part of our Security Month on DevCentral. I hope you enjoy all the features of this very powerful module on the BIG-IP! Read more
Average Rating: 4.7
14 Reviews

What is DNS?

What is the Domain Name System (DNS)? Imagine how difficult it would be to use the Internet if you had to remember dozens of number combinations to do anything. The Domain Name System (DNS) was created in 1983 to enable humans to easily identif... Read more
1 Review

Lightboard Lessons: BIG-IP Life of a Packet

In this episode of Lightboard Lessons, Jason updates an earlier Whiteboard Wednesday with a slight change in flow introduced in TMOS version 12.1. Some of the features in this flow are only applicable if you have hardware or if you have security... Read more
2 Reviews