Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Snippet #7: OWASP Useful HTTP Headers

If you develop and deploy web applications then security is on your mind.  When I want to understand a web security topic I go to OWASP.org, a community dedicated to enabling the world to create trustworthy web applications. One of my... Read more
Average Rating: 4.9
5 Reviews

SharePoint Conference 2012 Partner Spotlight – The SCE Group

I chat with Jose Barros, The SCE Group Director of Technology, to learn about their RSA Adaptive Authentication integration with BIG-IP APM.   ps Resources: SharePoint Conference 2012: Find F5 SharePoint Conference 2012: Gimme 90... Read more
0 Reviews

In 5 Minutes or Less: BIG-IP ASM & Cenzic Scanner

I show you in this special extended edition of In 5 Minutes or Less, how BIG-IP ASM is integrated with Cenzic Hailstorm Scanner for complete website protection. From vulnerability checking to detection to remediation, With a few clicks, you can... Read more
0 Reviews

Oracle OpenWorld 2012: BIG-IP ASM and Oracle Database Firewall Integration

I meet with F5 Business Development Solution Architect, Chris Akker to show the BIG-IP ASM integration with Oracle's Database Firewall. A layered, defense-in-depth approach along with the contextual information needed for digital forensic... Read more
0 Reviews

BYOD and the Death of the DMZ

#BYOD #infosec It's context that counts, not corporate connections. BYOD remains a topic of interest as organizations grapple not only technologically with the trend but politically, as well. There are dire warnings that refusing to support... Read more
0 Reviews

BIG-IP Edge Client 2.0.2 for Android

Earlier this week F5 released our BIG-IP Edge Client for Android with support for the new Amazon Kindle Fire HD.  You can grab it off Amazon instantly for your Android device.  By supporting BIG-IP Edge Client on Kindle Fire products, F5... Read more
1 Review

SmartTV, Smartphones and Fill-in-the-Blank Employees

Right off the bat, I know the title sounds like it’s all connected but they are only slightly related so I’ll give you the option of dropping out now.  Still here?  Cool.  I’ve been traveling over the last couple weeks and stories... Read more
0 Reviews

VMworld2012: VMware View Username Persistence

I hang with F5 Systems Engineer Joe Hermes for a cool demo showing the Username Persistence solution, which allows users to continue their VMware View session across devices. Pretty cool stuff, perfect for BYOD and an F5 exclusive. Apologies for... Read more
0 Reviews

Persistent Threat Management

#dast #infosec #devops A new operational model for security operations can dramatically reduce risk Examples of devops focuses a lot on provisioning and deployment configuration. Rarely mentioned is security, even though there is likely no... Read more
0 Reviews

BIG-IP Edge Client v1.0.4 for iOS

If you are running the BIG-IP Edge Client on your iPhone, iPod or iPad, you may have gotten an AppStore alert for an update.  If not, I just wanted to let you know that version 1.0.4 of the iOS Edge Client is available at the AppStore.The... Read more
0 Reviews

Application Security is a Stack

#infosec #web #devops There’s the stuff you develop, and the stuff you don’t. Both have to be secured. On December 22, 1944 the German General von Lüttwitz sent an ultimatum to Gen. McAuliffe, whose forces (the Screaming Eagles, in case... Read more
0 Reviews

In 5 Minutes or Less Video - IP Intelligence Service

I show you how to configure the IP Intelligence Service available on BIG-IP v11.2, in 5 Minutes or Less.  By identifying relevant IP addresses and leveraging intelligence from cloud-context security solutions, F5's new IP Intelligence... Read more
0 Reviews

Will BYOL Cripple BYOD?

Don’t ya love all the acronyms we have? So by now, you’ve probably heard that BYOD means Bring Your Own Device – a topic that is getting lots of press these days.  The concept of allowing employees to use their own personal device, often... Read more
0 Reviews

1024 Words: Building Secure Web Applications

A nice infographic from Veracode on building secure web applications Infographic by Veracode Application Security All 1024 Words posts on DevCentral  Recognizing a Threat is the First Step Towards Preventing It  ... Read more
0 Reviews

The Changing Security Threat Landscape Infographic

In conjunction with a new video and a security white paper, this F5 infographic validates the need for organizations to rethink security practices.  The global security threat landscape is rapidly evolving and has changed dramatically in ways... Read more
0 Reviews

Invasion of Privacy - Mobile App Infographic Style

Couple blogs/weeks ago, I posted What’s in Your Smartphone? covering the recent Nielsen report, State of the Appnation – A Year of Change and Growth in U.S. Smartphones.   According to the study, 70% (last year) and 73% (this year)... Read more
0 Reviews

Quantifying Reputation Loss From a Breach

#infosec #security Putting a value on reputation is not as hard as you might think… It’s really easy to quantify some of the costs associated with a security breach. Number of customers impacted times the cost of a first class stamp plus the... Read more
0 Reviews

Interop 2012 - Interview with Brian Monkman of ICSA Labs

I interview Brian Monkman, ICSA Labs' Technology Programs Manager, about ICSA certification, the importance of 3rd party tests, how ICSA conducts their certification testing along with Breaking News that the BIG-IP Family is now ICSA Certified... Read more
0 Reviews

Interop 2012 - Splunk Reports for BIG-IP Data Center Firewall with Danny Luedke

Peter Silva talks with F5 Product Marketing Manager Danny Luedke about the BIG-IP Data Center Firewall and showcases the new Splunk reports for BIG-IP Data Center Firewall Solution. ";" alt="" />Interop 2012 - Splunk... Read more
0 Reviews

When Big Data Meets Cloud Meets Infrastructure

#stirling #interop #infosec #bigdata Bridging the Gap between Big Data and Business Agility I’m a huge fan of context-aware networking. You know, the ability to interpret requests in the context they were made – examining user identity,... Read more
0 Reviews

Complying with PCI DSS–Part 6: Maintain an Information Security Policy

According to the PCI SSC, there are 12 PCI DSS requirements that satisfy a variety of security goals.  Areas of focus include building and maintaining a secure network, protecting stored cardholder data, maintaining a vulnerability management... Read more
0 Reviews

Complying with PCI DSS–Part 5: Regularly Monitor and Test Networks

According to the PCI SSC, there are 12 PCI DSS requirements that satisfy a variety of security goals.  Areas of focus include building and maintaining a secure network, protecting stored cardholder data, maintaining a vulnerability management... Read more
0 Reviews

Complying with PCI DSS–Part 4: Implement Strong Access Control Measures

According to the PCI SSC, there are 12 PCI DSS requirements that satisfy a variety of security goals.  Areas of focus include building and maintaining a secure network, protecting stored cardholder data, maintaining a vulnerability management... Read more
0 Reviews

Complying with PCI DSS–Part 3: Maintain a Vulnerability Management Program

According to the PCI SSC, there are 12 PCI DSS requirements that satisfy a variety of security goals.  Areas of focus include building and maintaining a secure network, protecting stored cardholder data, maintaining a vulnerability management... Read more
0 Reviews

Complying with PCI DSS–Part 2: Protect Cardholder Data

According to the PCI SSC, there are 12 PCI DSS requirements that satisfy a variety of security goals.  Areas of focus include building and maintaining a secure network, protecting stored cardholder data, maintaining a vulnerability management... Read more
0 Reviews