Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

BYOD–The Hottest Trend or Just the Hottest Term

It goes by many names: ‘Bring Your Own Danger’, ‘Bring Your Own Disaster’ and what most people call ‘Bring Your Own Device’ and everyone it seems is writing, talking and surveying about BYOD.  What used to be inconceivable, using your own... Read more
0 Reviews

Defense in Depth in Context

In the days of yore, a military technique called Defense-in-Depth was used to protect kingdoms, castles, and other locations where you might be vulnerable to attack. It's a layered defense strategy where the attacker would have to breach... Read more
0 Reviews

CSRF Prevention with F5's BIG-IP ASM v10.2

Watch how BIG-IP ASM v10.2 can prevent Cross-site request forgery.  Shlomi Narkolayev demonstrates how to accomplish a CSRF attack and then shows how BIG-IP ASM stops it in it's tracks. The configuration of CSRF protection is literally... Read more
0 Reviews

F5 at Interop - Ken Salchow talks about Recent Announcements

Peter Silva interviews Ken Salchow who talks about F5's recent announcements about BIG-IP LTM VE, F5's new hardware platforms, VMotion across data centers and cloud architecture. ps Read more
0 Reviews

CloudFucius Wonders: Can Cloud, Confidentiality and The Constitution Coexist?

This question has been puzzling a few folks of late, not just CloudFucius.  The Judicial/legal side of the internet seems to have gotten some attention lately even though courts have been trying to make sense and catch up with technology fo... Read more
0 Reviews

CloudFucius Says: AAA Important to the Cloud

While companies certainly see a business benefit to a pay-as-you-go model for computing resources, security concerns seem always to appear at the top of surveys regarding cloud computing. These concerns include authentication, authorization... Read more
0 Reviews

F5 BIG-IP Edge Gateway Performance Demo

Watch how F5 has solved the security plus acceleration challenge for remote users.  Demo shows how BIG-IP Edge Gateway is twice as fast as the competition at downloading a 5MB Microsoft SharePoint file.  A powerful example of... Read more
0 Reviews
0 Reviews

Catch some Zzzzzzzzzzzzz

It used to be the ‘stuck to our side’ pagers that go off at 3am telling you that a server crashed that would keep you up at night.  You’d drag yourself out of bed (or the chair at the data center that you fell asleep in), tippy-toe to th... Read more
0 Reviews

It all comes down to YOU - The User

One of my favorite Security writers, Bruce Schneier, had an interesting entry last week called Reacting to Security Vulnerabilities where he discusses the recent reports about the security flaw in the SSL protocol and how we as users should relax... Read more
0 Reviews

Log Files Do Not Improve Security

Logs are for auditing, accountability, and tracking down offenders – not for providing real-time security A new law signed into effect in February 2009 requires that health care providers and organizations subject to HIPAA notify affected... Read more
0 Reviews