Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Security Month on DevCentral

From discussing specific F5 security technology to looking back on security trends from 2016 to looking ahead at what's to come in 2017, the month of February on DevCentral will not disappoint! Read more
Average Rating: 4.9
3 Reviews

Cipher Rules And Groups in BIG-IP v13

DevCentral reviews Cipher Rules and Ciphers Groups in BIG-IP v13. Separating Cipher strings from SSL profiles allows us to ease cipher suite management so you can keep current with cryptographic trends and impress your friends. Read more
Average Rating: 4.9
4 Reviews

Cipher Suite Practices and Pitfalls

Cipher Suite Practices and Pitfalls It seems like every time you turn around there is a new vulnerability to deal with, and some of them, such as Sweet32, have required altering cipher configurations for mitigation.  Still other users may... Read more
Average Rating: 5.0
16 Reviews

CloudBleed: Guess What? There was 0-day protection

About CloudBleed If you aren’t familiar with CloudBleed, take a moment to read the following articles to get an understanding how it was found, what happened, and what PII/PCI data was (possibly) leaked: Vulnerability Disclosure from Tavis... Read more
Average Rating: 4.9
3 Reviews

Security Month on DevCentral: Challenge #2

Our first challenge focused on decrypting a secret message. Our second and final challenge requires you to search for clues around the Internet and find/calculate a secret value. Read more
Average Rating: 4.9
3 Reviews

Killing my passwords (with his tools)

As I prepped for this password killing journey, I couldn’t get the Fugees “Killing Me Softly” out of my head. Lauryn Hill kills it in that song (pun intended.) So I wrote a little intro you can hum along to the tune…I’ll wait. Feeling my pain... Read more
2 Reviews

What To Expect In 2017: Security And Government Regulations

The government and cloud security's relationship is surprisingly hands off. Current regulations already extend their umbrellas over our data in flight and rest regardless who's IaaS/SaaS you're using. For us traditional enterprise... Read more
1 Review

What To Expect In 2017: Security In The Cloud

DevCentral examines cloud security trends for 2017 and takes a few stabs at the reality of your realistic requirements. Read more
1 Review

What to Expect in 2017: Mobile Device Security

We are mobile, our devices are mobile, the networks we connect to are mobile and the applications we access are mobile. Mobility, in all its iterations, is a huge enabler and concern for enterprises and it'll only get worse as we start wearing... Read more
0 Reviews

Security Month on DevCentral: Challenge #1

Today's challenge focuses on cryptography. The object of this challenge is to figure out a plaintext message given some ciphertext and clues. Read more
Average Rating: 4.9
3 Reviews

Introducing the F5 Security Incident Response Team (F5 SIRT)

When your business is facing a security crisis, F5 has a team dedicated to helping you through it – the F5 Security Incident Response Team (SIRT). During a security incident, the F5 SIRT engages rapidly with the resources you need to respond. Read more
Average Rating: 4.9
4 Reviews

Abusing Open Resolvers

Open DNS resolvers can be used to recursively query authoritative name servers. In fact, a list of open resolvers can be found at http://openresolverproject.org/. Read more
0 Reviews

Encrypted malware vs. F5's full proxy architecture

Everyone knows that malware is a huge problem, and several recent studies have shown that nearly half of all malware is now encrypted. How do you go about finding it and stopping it if you can't even read it? Read more
1 Review

Encryption Basics: How RSA Works

The RSA Conference starts today in San Francisco, CA and we wanted to start off this week with a video that shows how RSA works. Maybe you've heard about RSA but you've never really understood how it works... Read more
Average Rating: 4.9
4 Reviews

Security Trends in 2016: The Problem Of Ransomware

Ransomware is a specific type of malware that encrypts important information and keeps it encrypted until the ransom (typically money) has been paid. Read more
1 Review

Security Trends in 2016: Defending DDoS Attacks

Distributed Denial of Service (DDoS) attacks were huge in 2016, and they will likely be a tough nemesis again in 2017…and beyond!  With all the excitement and trepidation surrounding these attacks, it’s important to know how to defend against... Read more
1 Review

Security Trends in 2016: Known Vulnerabilities Are Still Dangerous

FINISH HIM!  SSHowDowN Wins!  The proxy attack Akamai published on last October of 2016 sound like a character from Mortal Kombat. That would be a fun MK character, a little digitized malware-bot killing Sub-Zero or Goro.  In... Read more
2 Reviews

Security Trends in 2016: Securing the Internet of Things

Whenever you connect anything to the internet, there is risk involved. Just ask the millions of IoT zombies infected with Mirai. Sure, there have been various stories over the years about hacking thermostats, refrigerators, cameras, pacemakers,... Read more
0 Reviews

Security Trends in 2016: Pervasive Insecurity

The term pervasive insecurity can be applied to arrays of complex systems including poverty, political landscapes, or civil violence. It's aptly suited for defining any widespread and unwelcome instability of standardized governance(1).... Read more
2 Reviews

Getting Started with AFM

The BIG-IP Advanced Firewall Manager (AFM) is a high-performance, stateful, full-proxy network firewall designed to guard against incoming threats that enter the network on the most widely deployed protocols, HTTP. Read more
Average Rating: 4.9
4 Reviews

The BIG-IP Application Security Manager Part 1: What is the ASM?

F5's BIG-IP Application Security Manager (ASM) is a layer 7 web application firewall (WAF) available on BIG-IP platforms. Read more
Average Rating: 4.8
18 Reviews