Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

The Intruders of Things

Gartner predicts that by 2020, IoT security will make up 20 percent of annual security budgets. 2020 seems to be an important milestone for the Internet of Things. That’s the year that Cisco says there will be 50 billion connected devices and... Read more
1 Review

You Don’t Own Anything Anymore Including Your Privacy

You purchased a Tesla Model S and live the %1 eco-warrior dream.  Imagine if GM purchased Tesla and sent an over-the-air update to disable all Tesla cars because they’re working on their own electric substitute? Literally even if you were ... Read more
2 Reviews

Arguing with Things

As more things get connected, we may find ourselves disagreeing with them. We all argue, especially if you’re passionate about something. Sometimes it’s with our spouse, sometimes with friends or co-workers and sometimes we scold objects that... Read more
2 Reviews

Identity Theft: Not So Scary Anymore?

This article originally appeared on F5.com on 10.20.15. With Halloween in our rearview mirror and the holiday shopping season upon us, a couple surveys are out examining our fears and in particular, our concerns about identity theft. Apparently,... Read more
0 Reviews

Connecting the Threads

What was first used to protect humans from the outside elements is now monitoring our body's inside environment. According to eMarketer.com, wearable usage will grow almost 60% in 2015 verses 2014. This year, almost 40 million U.S. adults will... Read more
0 Reviews

Ask the Expert – Why Web Fraud Protection?

Corey Marshall, Security Solution Architect, explains why the browser is a new threat vector into an organization’s applications and infrastructure. This universal client can be the weakest link in the access chain and malicious characters ar... Read more
0 Reviews

Ask the Expert – Why SSL Everywhere?

Kevin Stewart, Security Solution Architect, talks about the paradigm shift in the way we think about IT network services, particularly SSL and encryption. Gone are the days where clear text roams freely on the internal network and organization... Read more
0 Reviews

Healthcare in the Crosshairs

Is Healthcare the new Target? Recently I've received a number of 'I am writing to inform you that we were the target of a sophisticated cyber attack and some of your personal information may have been accessed by the attackers..'... Read more
0 Reviews

The Internet of Me, Myself & I

What happens when the gadgets you wear also control the things around you? No doubt you've heard of various internet-connected things like light bulbs, coffee makers and thermostats making their way into our homes. And no doubt, you've... Read more
0 Reviews

The Digital Dress Code

Coming to an office near you. If you thought the Bring Your Own Device (BYOD) craze was a headache, just wait until button cameras, smart watches, and spy glasses (already here) are a daily occurrence in the office. Workplace #wearables will be a... Read more
0 Reviews

The Breach of Things

Yet another retailer has confessed that their systems were breached and an untold number of victims join the growing list of those who have had their data was stolen. This one could be bigger than the infamous Target breach. I wonder if some day... Read more
0 Reviews

Internet of Things OWASP Top 10

The Open Web Application Security Project (OWASP) is focused on improving the security of software. Their mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software... Read more
0 Reviews

Identity Theft Hits Close to Home

While certainly not the likes of having SWAT show up at my house like Krebs or even Honan's fiasco, we've had some ID theft attempts occurring for the past few months...actually my wife has. It all started innocently enough at a... Read more
0 Reviews

Privacy for a Price

A few weeks ago, I went to my usual haircut place and after the trim at the register I presented my loyalty card.  You know the heavy paper ones that either get stamped or hole-punched for each purchase.  After a certain number of paid... Read more
0 Reviews

The Million Mobile Malware March

Milestone has been breached according to Trend Micro.  Just a few months ago, they reported in their 2Q Security Roundup that there were 718,000 malicious or risky Andriod mobile apps available (up from 509,000 in Q1) and crystal-ball'd... Read more
0 Reviews

BYOD 2.0 -- Moving Beyond MDM

#BYOD has quickly transformed IT, offering a revolutionary way to support the mobile workforce. The first wave of BYOD featured MDM solutions that controlled the entire device. In the next wave, BYOD 2.0, control applies only to those apps... Read more
0 Reviews

BYOD - More Than an IT Issue

I explain the various organizational entities that should be involved when creating a BYOD policy. ps Related: F5's Feeling Alive with Newly Unveiled Mobile App Manager Inside Look - F5 Mobile App Manager Is BYO Already D? Will BYOL Cripple... Read more
0 Reviews

Q. The Safest Mobile Device? A. Depends

Depends?!?  Well, isn't that the answer to a lot of things in this world?  Often our answer depends on the context of the question.  Sometimes the answer depends on who you ask since it may only be an opinion or a feeling. ... Read more
0 Reviews

Lost Records a Day Shows Doctors are Blasé

#HealthCare #Privacy Challenges I always wanted to write, 'In the USA Today, today' in the Life section snapshots sidebar there is an interesting stat from a December 2012 Ponemon Institute study of 80 health care organizations showin... Read more
0 Reviews

You’ll Shoot Your Eye Out…

…is probably one of the most memorable lines of any Holiday Classic.  Of course I’m referring to A Christmas Story, where a young Ralphie tries to convince his parents, teachers and Santa that the Red Ryder BB Gun is the perfect... Read more
0 Reviews

Holiday Shopping SmartPhone Style

Close to 70% of smartphone owners plan to use the devices for holiday shopping, according to Deloitte (pdf).  Smartphone ownership has jumped from 39.7% last year to 46.1% this year and tablet owners have doubled from 10.5% to 22.4% according... Read more
0 Reviews

BYOD Policies – More than an IT Issue Part 5: Trust Model

#BYOD or Bring Your Own Device has moved from trend to an permanent fixture in today's corporate IT infrastructure. It is not strictly an IT issue however. Many groups within an organization need to be involved as they grapple with the risk of... Read more
0 Reviews

BYOD Policies – More than an IT Issue Part 4: User Experience and Privacy

#BYOD or Bring Your Own Device has moved from trend to an permanent fixture in today's corporate IT infrastructure. It is not strictly an IT issue however. Many groups within an organization need to be involved as they grapple with the risk of... Read more
0 Reviews

BYOD Policies – More than an IT Issue Part 3: Economics

#BYOD or Bring Your Own Device has moved from trend to an permanent fixture in today's corporate IT infrastructure. It is not strictly an IT issue however. Many groups within an organization need to be involved as they grapple with the risk of... Read more
0 Reviews

BYOD Policies – More than an IT Issue Part 1: Liability

#BYOD or Bring Your Own Device has moved from trend to an permanent fixture in today's corporate IT infrastructure. It is not strictly an IT issue however. Many groups within an organization need to be involved as they grapple with the risk of... Read more
0 Reviews