Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

ImageTragick - The Tragick continues

CVE- 2016-5118 a new remote command execution vulnerability in ImageMagick based software is detected in ASM as a 0-day Read more
0 Reviews
Average Rating: 4.9
3 Reviews

Sudah Saatnya Perusahaan Mengkaji Kembali Kebutuhan Sistem IT Agar Mampu Mengatasi Tantangan Bisnis Di Masa Depan

Please find the English language post from which this was adapted here. Pesatnya perkembangan teknologi digital di Indonesia saat ini, membuat pola konsumsi berubah-ubah; baik di level konsumen maupun enterprise. Perubahan ini berpengaruh besar... Read more
0 Reviews

GHOST Vulnerability (CVE-2015-0235)

On 27 of January Qualys has published a critical vulnerability dubbed “GHOST” as it can be triggered by the GetHOST functions ( gethostbyname*() ) of the “glibc” library shipping with the Linux kernel. Those functions are used to get Read more
Average Rating: 3.3
7 Reviews

آخر تطورات مشهد تهديدات الأمن الالكتروني في المملكة العربية السعودية "الهجمات أصبحت أكثر قوةً وتعقيداً من أي وقت مضى"

: أقر كبار صناع القرار في قطاع تقنية المعلومات بالمملكة العربية السعودية بأن التهديدات الالكترونية تتنامى بشدة وعلى نطاق واسع في جميع أنحاء المملكة، ما يعرض الشركات لمخاطر إصابة سمعتها ومكانتها وبنيتها الأساسية. وقد أظهرت نتائج الدراسة... Read more
0 Reviews

Keamanan adalah Sebuah Proses

Pasar e-commerce sedang berkembang dengan pesat di Indonesia. Setidaknya di tahun 2014 ini saja, sudah ada lebih dari 5 startup dan perusahaan yang membuka situs e-commerce baru . Menurut data dari Kementerian Komunikasi dan Informatika, pasar... Read more
0 Reviews

Mitigating Winshock (CVE-2014-6321) Vulnerabilities Using BIG-IP iRules

Recently we’ve witnessed yet another earth shattering vulnerability in a popular and very fundamental service. Dubbed Winshock, it follows and joins the Heartbleed, Shellshock and Poodle in the pantheon of critical vulnerabilities discovered in... Read more
2 Reviews

DRUPAL Critical SQLI (CVE-2014-3704)

Drupal is an open source framework written in PHP and is ranked as the third most popular content management system by W3Techs. It has introduced a database abstraction API to prevent SQL injection attacks, so only sanitized queries will execute.... Read more
1 Review

セキュリティはプロセスである

昨今の新聞記事において、支払いシステムを含めたIT製品やアプリケーションの多くが十分なセキュリティ機能を有していないという警告がありました。理由として、まずセキュリティは後付けという考えがあるということ、二つ目にはセキュリティの専門知識を持った人は、デザインやそれらの製品またはアプリケーションの実施に関わっていないということが挙げられています。 ... Read more
0 Reviews

Mitigating the Unknown

Mitigating “0-day” attacks, which are named like that because the programmer has zero days to fix the flaw, is apparently impossible. However in practice they can be significantly mitigated. We can buy some time by heavily reducing the... Read more
Average Rating: 4.9
4 Reviews

Webshells

Webshells are web scripts (PHP/ASPX/etc.) that act as a control panel for the server running them. A webshell may be legitimately used by the administrator to perform actions on the server, such as: Create a user Restart a service Clean up... Read more
Average Rating: 4.9
3 Reviews

Evaluating Your Tech Needs

In our increasingly digitised world, consumption habits are changing – both at a consumer and enterprise level – which in turn will significantly impact the way the C-Suite assesses their company’s technology needs. Consumers and employees are... Read more
0 Reviews

Threat Analysis: perlb0t

This ancient bot, also known as the “Mambo” bot (due to an old vulnerability in the Mambo CMS it tried to exploit) has been around for a very long time, and many variations of it has been seen. However, from our observations, it is still being... Read more
1 Review

Success in an app-defined world

We live in an app-defined world. Businesses run on applications and it is critical that applications are accessible on any device, everywhere in the world. At F5, we recognise the importance of this. This is why we are delighted that F5 has been... Read more
0 Reviews

Who needs a Bot Army these days?

It’s been a while - a long while - since I last (officially) blogged. Too many distractions with a new role, new travels, and a new family member - sucks away the creative juices. Alas, sitting at an airport lounge after a 3 city Security Roadshow... Read more
0 Reviews

F5 예측: 사회적 기술의 확산이 보안위협을 증가시킨다.

‘F5 예측’ 시리즈를 시작하며 그 첫 주제로 기업들이 무시하기 어려운 것으로 판명된 이슈를 택했는데, 그것은 바로 기업에 사회적 기술 (SNS 기술)들이 홍수처럼 몰려오고 있다는 것이다. 많은 기업들은 생산성 향상, 더 효율적인 근무 환경, 동료와 부서들간의 더 긴밀한 협업, 그리고 고객과 기업 사이의 더욱 확대된 브랜드 경험 등 이 기술이 가져오는 가치에 대해 잘 이해하고 있다. 많은 기업들이 시장의 진화도 목격하고 있다. 특히,... Read more
0 Reviews

F5 predicts: The dumb firewall will become obsolete

Based on Gartner’s prediction, by 2016, the financial impact of cybercrime would grow by 10 per cent per year, due to the continuing discovery of new vulnerabilities fuelled by the increasing adoption of mobile collaboration platforms and cloud... Read more
0 Reviews

F5 Predicts: Internet of Things Drives Demand for ‘Social Intelligence’

‘Innovation distinguishes between a leader and a follower’, Steve Jobs once famously said. A saying that is crucial for organizations in their efforts to be a ‘global player’. There are currently lots of innovation areas in the technology space,... Read more
0 Reviews

F5 predicts: Social Adoption opens up security risks

Kicking off the ‘F5 predictions’ series is a topic that is proving difficult for businesses to ignore: the avalanche of social technologies coming into the enterprise. Many companies understand the value technology brings, such as increased... Read more
0 Reviews

Leave No Application Behind

F5의 새로운 아키텍처 비전 Synthesis 그리고F5 코리아의 괄목할만한 사업성과와 비전 F5 네트웍스 코리아는 지난 1월 27일 기자간담회를 열어 소프트웨어정의 애플리케이션 서비스(SDAS)를 제공하는 새로운 아키텍처 비전 ‘F5 Synthesis’를 설명하고, F5 코리아의 괄목할만한 2013년 비즈니스 성과와 2014년 계획을 소개하는 자리를 가졌다. 당일 발표는 F5 코리아 조원균 지사장과 아시아 태평양 지역 제품 마케팅 총괄... Read more
0 Reviews

보안은 과정이다.

최근 해외의 권위 있는 한 신문은 결제시스템을 포함한 많은 IT 제품들과 애플리케이션들이 적절한 보안을 갖추고 있지 못하다고 경고했다. 이 신문은 첫째, 보안이 최우선적인 고려사항으로 간주되지 않고 있으며, 둘째는 시스템의 디자인 및 구현에 보안 전문가들이 관여하고 있지 않기 때문이라고 그 이유를 밝혔다. F5 네트웍스는 보안을 일회성의 조치나 행위가 아닌 일련의 과정으로 생각하고 있으며, 보안은 이런 관점에서 접근되어야 한다. 조직... Read more
0 Reviews

Tackling Cyber Attacks From Within

An increasing number of organizations face serious security threats that are socially, politically and economically motivated. Conventional firewalls are no longer enough to prevent complex and frequent cyber attacks such as multi-layer... Read more
0 Reviews

APAC market research points to WAF being integrated with application delivery

We entered 2014 on a fillip. Frost & Sullivan had just named us the vendor leading WAF market in Asia Pacific and Japan. The Frost Industry Quotient, put F5 and nine other companies under their analytical magnifying glass, examining our mark... Read more
0 Reviews

Security is a process

A newspaper report recently warned that many IT products and applications, including payment systems, lack adequate security. The reasons cited are that firstly, security is treated as an afterthought, and secondly, because trained practitioners... Read more
0 Reviews

SDN and Security: Network versus Applications

#SDN #Infosec #SDDC #SDAS As attackers move up the stack, so must defenders That attackers are moving "up the stack", toward the application layer, should be no surprise. Increasingly, network layer attacks are a distraction; a means to... Read more
0 Reviews