Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

You’ll Shoot Your Eye Out…

…is probably one of the most memorable lines of any Holiday Classic.  Of course I’m referring to A Christmas Story, where a young Ralphie tries to convince his parents, teachers and Santa that the Red Ryder BB Gun is the perfect... Read more
0 Reviews

Holiday Shopping SmartPhone Style

Close to 70% of smartphone owners plan to use the devices for holiday shopping, according to Deloitte (pdf).  Smartphone ownership has jumped from 39.7% last year to 46.1% this year and tablet owners have doubled from 10.5% to 22.4% according... Read more
0 Reviews

SmartTV, Smartphones and Fill-in-the-Blank Employees

Right off the bat, I know the title sounds like it’s all connected but they are only slightly related so I’ll give you the option of dropping out now.  Still here?  Cool.  I’ve been traveling over the last couple weeks and stories... Read more
0 Reviews

From Car Jacking to Car Hacking

With the promise of self-driving cars just around the corner of the next decade and with researchers already able to remotely apply the brakes and listen to conversations, a new security threat vector is emerging.  Computers in cars have been... Read more
0 Reviews

The Venerable Vulnerable Cloud

Ever since cloud computing burst onto the technology scene a few short years ago, Security has always been a top concern.  It was cited as the biggest hurdle in many surveys over the years and in 2010, I covered a lot of those in my... Read more
0 Reviews

F5 Agility Summit 2012 - Infoblox

I meet with Infoblox's Senior Product Manager, Andy Voltmer about the F5/Infoblox partnership, the importance of DNS and the security around DNSSEC.  Reporting from the F5 Agility Conference in Times Square.psResources: F5 Rethink Your... Read more
0 Reviews

Infographic: Protect Yourself Against Cybercrime

Maybe I’ll start doing an ‘Infographic Friday’ to go along with Lori’s F5 Friday.  This one comes to us from  Rasmussen College's School of Technology and Design Cyber Security Program and shows the online risks and offers some good... Read more
0 Reviews

The Exec-Disconnect on IT Security

Different Chiefs give Different Security Stories. A recent survey shows that there is a wide gap between CEOs and Chief Security Officers when it comes to the origin and seriousness of security threats.  They differ on how they view threats... Read more
0 Reviews

The Changing Security Threat Landscape Infographic

In conjunction with a new video and a security white paper, this F5 infographic validates the need for organizations to rethink security practices.  The global security threat landscape is rapidly evolving and has changed dramatically in ways... Read more
0 Reviews

Invasion of Privacy - Mobile App Infographic Style

Couple blogs/weeks ago, I posted What’s in Your Smartphone? covering the recent Nielsen report, State of the Appnation – A Year of Change and Growth in U.S. Smartphones.   According to the study, 70% (last year) and 73% (this year)... Read more
0 Reviews

2011 Telly Award Winner - The F5 Dynamic Data Center

Founded in 1978 to honor excellence in local, regional, cable TV commercials along with non-broadcast video and TV programs, The Telly Awards is the premier award honoring the finest film and video productions, groundbreaking web commercials,... Read more
0 Reviews

Vulnerability Assessment with Application Security

The longer an application remains vulnerable, the more likely it is to be compromised. Protecting web applications is an around-the-clock job. Almost anything that is connected to the Internet is a target these days, and organizations are... Read more
0 Reviews

ICSA Certified Network Firewall for Data Centers

The BIG-IP platform is now ICSA Certified as a Network Firewall.Internet threats are widely varied and multi-layered. Although applications and their data are attackers’ primary targets, many attackers gain entry at the network layer. ... Read more
0 Reviews

Security’s Rough Ride

1 if by land, 2 of by sea, 0 if by IPI know I’ve said this before but it sure seems like almost daily there is a security breach somewhere.  Over the years, the thought process has changed from prevent all attacks to, it is inevitable that we... Read more
0 Reviews

Cloud Security With FedRAMP

Want to provide Cloud services to the federal government?  Then you’ll have to adhere to almost 170 security controls under the recently announced Federal Risk and Authorization Management Program.  The program, set to go live in June,... Read more
0 Reviews

355 Shopping Days Left

After just being bombarded with the endless options of gifts for your loved ones, a simple reminder that the next blitz is just around the corner.  And you are a target.  2011 started relatively tame for breaches but when hacktivism and... Read more
0 Reviews

F5 Security Vignette Series

Over the last couple weeks, we’ve been rolling out a series of short Security Vignette videos about various IT security challenges.  We’ve posted them to the F5News blog account but also wanted to share in case you missed them.  If we... Read more
0 Reviews

The Top 10, Top Predictions for 2012

Around this time of year, almost everyone and their brother put out their annual predictions for the coming year.  So instead of coming up with my own, I figured I’d simply regurgitate what many others are expecting to happen.  ... Read more
0 Reviews

F5 BIG-IP Platform Security

When creating any security-enabled network device, development teams must fully investigate security of the device itself to ensure it cannot be compromised.  A gate provides no security to a house if the gap between the bars is large enough... Read more
0 Reviews

Our Identity Crisis

As as kid, my mom would constantly remind me that I was a Hawaiian Prince – a direct descendant of King Kamehameha’s grandparents and the Kekaulike (23rd Moi of Maui) line.  I was born in Hawaii but grew up on the East Coast so as a kid, I... Read more
0 Reviews

IPS or WAF Dilemma

As they endeavor to secure their systems from malicious intrusion attempts, many companies face the same decision: whether to use a web application firewall (WAF) or an intrusion detection or prevention system (IDS/IPS).  But this notion that... Read more
0 Reviews

DNSSEC: Is Your Infrastructure Ready?

A few months ago, we teamed with Infoblox for a DNSSEC webinar.  Jonathan George, F5 Product Marketing Manager, leads with myself and Cricket Liu of Infoblox as background noise.  He’s a blast as always and certainly knows his DNS. ... Read more
0 Reviews

Security Never Takes a Vacation

We’ve all seen the auto-out-of-office replies, ‘Thanks for your message but I’m out until I return – contact my boss/subordinate/someone else if you need or want anything.’  If you’ve emailed me over the last couple weeks, you’ve seen a... Read more
0 Reviews

Dynamic Application Control and Attack Protection

If you’ve perused any media outlet of late, the barrage of cyber threats are unrelenting and protecting your networks and applications continues to be a never ending task.  Organizations are making significant investments in IT security to... Read more
0 Reviews