Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

The DevCentral Chronicles June Edition 1(6)

Heading into the summer months is always a nice time of year – school is out, warmer weather, BBQs, beaches, baseball and maybe some vacation time. And hopefully all the Dads had a nice Father’s Day as we dive into our 6th installment of the DC... Read more
1 Review

Mitigate L7 DDoS with BIG-IP ASM

Today, let’s look at a couple ways to mitigate a DDoS attack with BIG-IP ASM. We’ve logged into a BIG-IP ASM and navigated to Security>DDoS Protection>DDoS Profiles. In the General Settings of Application Security, we’ll activate an... Read more
1 Review

Shellshock – The SIP Proxy Edition

The recent Shellshock and Heartbleed vulnerabilities have something in common – they both affect very infrastructural services. That is the reason their magnitude is much bigger than any other ol’ vulnerability out there. “Everyone” uses bash,... Read more
Average Rating: 4.9
3 Reviews

Bash Shellshock Mitigation Using ASM Signatures

This week we've seen new vulnerabilities with massive damage potential come to light – CVE-2014-6271 and CVE-2014-7169 - named quite appropriately "Shellshock". Background You can find details regarding this bash vulnerability on... Read more
0 Reviews

Security’s FUD Factor

Had a short but interesting twitter exchange with @securityincite @Gillis57 and @essobi ‏(Mike Rothman, Gillis Jones and not sure (sorry!!) respectively) about using Fear, Uncertainty and Doubt when talking... Read more
0 Reviews

You’ll Shoot Your Eye Out…

…is probably one of the most memorable lines of any Holiday Classic.  Of course I’m referring to A Christmas Story, where a young Ralphie tries to convince his parents, teachers and Santa that the Red Ryder BB Gun is the perfect... Read more
0 Reviews

Holiday Shopping SmartPhone Style

Close to 70% of smartphone owners plan to use the devices for holiday shopping, according to Deloitte (pdf).  Smartphone ownership has jumped from 39.7% last year to 46.1% this year and tablet owners have doubled from 10.5% to 22.4% according... Read more
0 Reviews

BYOD Policies – More than an IT Issue Part 5: Trust Model

#BYOD or Bring Your Own Device has moved from trend to an permanent fixture in today's corporate IT infrastructure. It is not strictly an IT issue however. Many groups within an organization need to be involved as they grapple with the risk of... Read more
0 Reviews

The Venerable Vulnerable Cloud

Ever since cloud computing burst onto the technology scene a few short years ago, Security has always been a top concern.  It was cited as the biggest hurdle in many surveys over the years and in 2010, I covered a lot of those in my... Read more
0 Reviews

Persistent Threat Management

#dast #infosec #devops A new operational model for security operations can dramatically reduce risk Examples of devops focuses a lot on provisioning and deployment configuration. Rarely mentioned is security, even though there is likely no... Read more
0 Reviews

Freedom vs. Control

No sooner had I posted BYOD–The Hottest Trend or Just the Hottest Term, last week than yet another BYOD survey hit the news.  The full results will be released in a webinar tomorrow but SANS announced their First Annual Survey Results on... Read more
0 Reviews

Surfing the Surveys: Cloud, Security and those Pesky Breaches

While I’m not the biggest fan of taking surveys, I sure love the data/reports that are generated by such creatures.  And boy has there been a bunch of recent statistical information released on cloud computing, information security, breaches... Read more
0 Reviews

The Potential Ramifications of Platform-Based Vulnerabilities on Cloud Computing

#infosec #adcfw #cloud Alternate title: How to take out an entire PaaS cloud with one vulnerability Apache Killer. Post of Doom. What do these two vulnerabilities have in common? Right, they’re platform-based vulnerabilities. Meaning they... Read more
0 Reviews

F5 Friday: Goodbye Defense in Depth. Hello Defense in Breadth.

#adcfw #infosec F5 is changing the game on security by unifying it at the application and service delivery layer. Over the past few years we’ve seen firewalls fail repeatedly. We’ve seen business disrupted, security thwarted, and reputations... Read more
0 Reviews

ICSA Certified Network Firewall for Data Centers

The BIG-IP platform is now ICSA Certified as a Network Firewall.Internet threats are widely varied and multi-layered. Although applications and their data are attackers’ primary targets, many attackers gain entry at the network layer. ... Read more
0 Reviews

Security’s Rough Ride

1 if by land, 2 of by sea, 0 if by IPI know I’ve said this before but it sure seems like almost daily there is a security breach somewhere.  Over the years, the thought process has changed from prevent all attacks to, it is inevitable that we... Read more
0 Reviews

The Ascendancy of the Application Layer Threat

#adcfw Normal0falsefalsefalseEN-USX-NONEX-NONEMicrosoftInternetExplorer4/* Style Definitions */table.MsoNormalTable{mso-style-name:"Table... Read more
0 Reviews
0 Reviews

Cloud Security With FedRAMP

Want to provide Cloud services to the federal government?  Then you’ll have to adhere to almost 170 security controls under the recently announced Federal Risk and Authorization Management Program.  The program, set to go live in June,... Read more
0 Reviews

F5 Security Vignette Series

Over the last couple weeks, we’ve been rolling out a series of short Security Vignette videos about various IT security challenges.  We’ve posted them to the F5News blog account but also wanted to share in case you missed them.  If we... Read more
0 Reviews

BFF: Complexity and Operational Risk

#adcfw The reason bars place bouncers at the door is because it’s easier and less riskier to prevent entry than to root out later No one ever said choosing a career in IT was going to be easy, but no one said it had to be so hard you’d be... Read more
0 Reviews

2012 IT Staffing Crisis?

After just proclaiming, a mere four days ago in The Top 10, Top Predictions for 2012, that I wouldn’t predict anything for 2012 and simply would repurpose other’s predictions, I offer this prognosis. An area I have been thinking about recently is... Read more
0 Reviews

Dynamic Attack Protection and Access Control with BIG-IP v11

We try to offer many learning opportunities thru webinars so if there are other topics you’re interested in, there are some links below but also check out the F5 WebCasts page along with DevCentral’s Media site.  We also post video content to... Read more
0 Reviews

F5 BIG-IP Platform Security

When creating any security-enabled network device, development teams must fully investigate security of the device itself to ensure it cannot be compromised.  A gate provides no security to a house if the gap between the bars is large enough... Read more
0 Reviews

When Personal Security is Compromised

My Greatest Fears RealizedI debated about writing and/or blogging about this for a few days since it is very personal and didn’t want a pity-party coming my way.  But covering security, often from the human behavior standpoint, is what I do... Read more
0 Reviews