Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Identity Theft: Not So Scary Anymore?

This article originally appeared on F5.com on 10.20.15. With Halloween in our rearview mirror and the holiday shopping season upon us, a couple surveys are out examining our fears and in particular, our concerns about identity theft. Apparently,... Read more
0 Reviews

Is Your DNS Vulnerable?

A recent report from The Infoblox DNS Threat Index (in conjunction with Internet Identity) shows that phishing attacks has raised the DNS threat level to a record high of 133 for second quarter of 2015, up 58% from the same time last year. The... Read more
0 Reviews

Is 2015 Half Empty or Half Full?

With 2015 crossing the half way point, let's take a look at some technology trends thus far. Breaches: Well, many databases are half empty due to the continued rash of intrusions while the crooks are half full with our personal information.... Read more
0 Reviews

Healthcare in the Crosshairs

Is Healthcare the new Target? Recently I've received a number of 'I am writing to inform you that we were the target of a sophisticated cyber attack and some of your personal information may have been accessed by the attackers..'... Read more
0 Reviews

The Breach of Things

Yet another retailer has confessed that their systems were breached and an untold number of victims join the growing list of those who have had their data was stolen. This one could be bigger than the infamous Target breach. I wonder if some day... Read more
0 Reviews

Fear and Loathing ID Theft

Do you avoid stores that have had a credit card breach? You are not alone. About 52% of people avoid merchants who have had a data breach according to a recent Lowcards survey. They surveyed over 400 random consumers to better understand the... Read more
0 Reviews

Will the Cloud Soak Your Fireworks?

This week in the States, the Nation celebrates it's Independence and many people will be attending or setting off their own fireworks show. In Hawaii, fireworks are shot off more during New Year's Eve than on July 4th and there is even... Read more
0 Reviews

The Reach of a Breach

It comes as no surprise that the CEO of Target has resigned in the wake of their massive data breach. The 2nd executive, if I remember correctly, to resign due to the mishap. Data breaches are costly according to the most recent Ponemon 2014 Cost... Read more
0 Reviews

A Decade of Breaches

Whales Not Included Being from the Hawaiian Islands, the annual gathering of the Kohola (humpback whales) is always a spectacular view. They can get over half their body out of the water and administer a cannonball body slam splash like you've... Read more
0 Reviews

Bricks (Thru the Window) and Mortar (Rounds)

...or I've been Breached. There was a time when people differentiated between stealing from a physical store and pilfering data from a network.  Throughout the years there have been articles talking about the safety/risks of shopping... Read more
0 Reviews

OK 2014, Now What

So I've been staring at this blinking cursor for the last 5 minutes wondering what story to tell.  'Once upon a time, there was a....'  No that won't work.  'It was a dark and dreary night as our protagonist... Read more
0 Reviews

World's Biggest Data Breaches [Infographic]

Cool and disturbing at the same time.  A fully interactive version can be found here where you can click each circle to get more information.   I thought about adding all the numbers but stopped at 140,621,000 between 2012 and... Read more
0 Reviews

Hackable Homes

Is your house vulnerable?  Imagine coming home, disarming the alarm system, unlocking your doors and walking into a ransacked dwelling.  There are no broken windows, no forced entry, no compromised doggie doors and really no indication... Read more
0 Reviews

Targets of Opportunity

#dbir ...Is one of the findings in #Verizon's 2013 Data Breach Investigations Report, which is chuck full of interesting data.  75% of the attack victims were selected because they had a weakness that an attacker knew how to exploit... Read more
0 Reviews

Ride The Crime Coaster

Now that would be a fun amusement park ride - the Crime Coaster - with the hills and valleys designed based on crime statistic charts.  You can even get a digital photo of yourself as you fly thru the Tunnel of Turmoil. ... Read more
0 Reviews

Every Day is a 0-Day Nowadays

It sure seems like 0-Days are now an every day occurrence.  Headlines containing, 'breach,'  'attack,' 'hack,' 'vulnerability,' 'passwords,' 'compromised,' and 'you' are commonplace... Read more
0 Reviews

SmartTV, Smartphones and Fill-in-the-Blank Employees

Right off the bat, I know the title sounds like it’s all connected but they are only slightly related so I’ll give you the option of dropping out now.  Still here?  Cool.  I’ve been traveling over the last couple weeks and stories... Read more
0 Reviews

Infographic: Protect Yourself Against Cybercrime

Maybe I’ll start doing an ‘Infographic Friday’ to go along with Lori’s F5 Friday.  This one comes to us from  Rasmussen College's School of Technology and Design Cyber Security Program and shows the online risks and offers some good... Read more
0 Reviews

Quantifying Reputation Loss From a Breach

#infosec #security Putting a value on reputation is not as hard as you might think… It’s really easy to quantify some of the costs associated with a security breach. Number of customers impacted times the cost of a first class stamp plus the... Read more
0 Reviews

Surfing the Surveys: Cloud, Security and those Pesky Breaches

While I’m not the biggest fan of taking surveys, I sure love the data/reports that are generated by such creatures.  And boy has there been a bunch of recent statistical information released on cloud computing, information security, breaches... Read more
0 Reviews

5 Stages of a Data Breach

One thing I’ve noticed over the last couple years is that there are 5 Stages of a Data Breach: Denial: We do not believe these attacks breached our critical servers. Anger: We want to make it clear that we take security seriously! Bargaining:... Read more
0 Reviews

Security’s Rough Ride

1 if by land, 2 of by sea, 0 if by IPI know I’ve said this before but it sure seems like almost daily there is a security breach somewhere.  Over the years, the thought process has changed from prevent all attacks to, it is inevitable that we... Read more
0 Reviews

Custom Code for Targeted Attacks

Botnets?  Old school.  Spam?  So yesterday.  Phishing?  Don’t even bother…well, on second thought.  Spaghetti hacking like spaghetti marketing, toss it and see what sticks, is giving way to specific development of... Read more
0 Reviews

And The Hits Keep Coming

In case you missed this over the long weekend, a few more notable names were compromised in recent weeks.  A few weeks ago I wrote about how the Big Attacks are Back and it sure seems like the hits keep coming.  First, last Friday,... Read more
0 Reviews

Technology Can Only Do So Much

People Make The Difference.  One thing I’ve noticed with a few of the recent high profile attacks and breaches is that the human element played a significant role.  The technology used to stop, thwart, defend and otherwise render these... Read more
0 Reviews