Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Hello Infiltrators - Our Doors are Wide Open

In the 1946 classic ‘Hair Raising Hare,’ Bugs Bunny asks, ‘Have you ever have the feeling you were being watched? Like the eyes of strange things are upon you?’ Like Bugs often did, he breaks the fourth wall and involves the audience directly,... Read more
0 Reviews

RSA2015 Partner Spotlight - RSA Risk Based Authentication

RSA Technology Consultant Josh Waterloo talks about the evolution of two-factor authentication and how risk based auth is starting to take hold. He also shows us a demo of the integration between RSA SecurID and BIG-IP APM to provide risk based,... Read more
0 Reviews

Will the Cloud Soak Your Fireworks?

This week in the States, the Nation celebrates it's Independence and many people will be attending or setting off their own fireworks show. In Hawaii, fireworks are shot off more during New Year's Eve than on July 4th and there is even... Read more
0 Reviews

FedRAMP Federates Further

FedRAMP (Federal Risk and Authorization Management Program), the government’s cloud security assessment plan, announced late last week that Amazon Web Services (AWS) is the first agency-approved cloud service provider.  The accreditation... Read more
0 Reviews

Ride The Crime Coaster

Now that would be a fun amusement park ride - the Crime Coaster - with the hills and valleys designed based on crime statistic charts.  You can even get a digital photo of yourself as you fly thru the Tunnel of Turmoil. ... Read more
0 Reviews

Mobile Threats Rise 261% in Perspective

A new report from ABI Research indicates that the number of unique mobile threats grew 261% in just two quarters.  As mobile functionality grows so does the vulnerability threat vector as mobile malware is starting to target certain... Read more
0 Reviews

Q. The Safest Mobile Device? A. Depends

Depends?!?  Well, isn't that the answer to a lot of things in this world?  Often our answer depends on the context of the question.  Sometimes the answer depends on who you ask since it may only be an opinion or a feeling. ... Read more
0 Reviews

Security’s FUD Factor

Had a short but interesting twitter exchange with @securityincite @Gillis57 and @essobi ‏(Mike Rothman, Gillis Jones and not sure (sorry!!) respectively) about using Fear, Uncertainty and Doubt when talking... Read more
0 Reviews

TraceSecurity: DevOps Meets Compliance

#infosec #devops #bigdata #cloud IT security initiatives can benefit from a devops approach enabled with a flexible framework What do you get when you mix some devops with compliance and its resulting big data? Okay, aside from a migraine... Read more
0 Reviews

Hybrid–The New Normal

From Cars to Clouds, The Hybrids are HereMost of us are hybrids.  I’m Hawaiian and Portuguese with a bit of English and old time Shogun.  The mix is me.  I bet you probably have some mix from your parents which makes you a... Read more
0 Reviews

From Car Jacking to Car Hacking

With the promise of self-driving cars just around the corner of the next decade and with researchers already able to remotely apply the brakes and listen to conversations, a new security threat vector is emerging.  Computers in cars have been... Read more
0 Reviews

Infographic: Protect Yourself Against Cybercrime

Maybe I’ll start doing an ‘Infographic Friday’ to go along with Lori’s F5 Friday.  This one comes to us from  Rasmussen College's School of Technology and Design Cyber Security Program and shows the online risks and offers some good... Read more
0 Reviews

Cloud vs Cloud

The Battle of the Clouds Aloha!  Welcome ladies and gentleman to the face off of the decade.  The Battle of the Clouds.  In this corner, the up and comer, the phenom that has changed the way IT works, wearing the light shorts - The... Read more
0 Reviews

The Changing Security Threat Landscape Infographic

In conjunction with a new video and a security white paper, this F5 infographic validates the need for organizations to rethink security practices.  The global security threat landscape is rapidly evolving and has changed dramatically in ways... Read more
0 Reviews

Invasion of Privacy - Mobile App Infographic Style

Couple blogs/weeks ago, I posted What’s in Your Smartphone? covering the recent Nielsen report, State of the Appnation – A Year of Change and Growth in U.S. Smartphones.   According to the study, 70% (last year) and 73% (this year)... Read more
0 Reviews

Complying with PCI DSS–Part 3: Maintain a Vulnerability Management Program

According to the PCI SSC, there are 12 PCI DSS requirements that satisfy a variety of security goals.  Areas of focus include building and maintaining a secure network, protecting stored cardholder data, maintaining a vulnerability management... Read more
0 Reviews

Blog Roll 2011

It’s that time of year when we gift and re-gift.  And the perfect opportunity to re-post, re-purpose and re-use my 2011 blog entries.  If you missed any of the approximately 50 blogs, 11 audio whitepapers or 47 videos, here they are... Read more
0 Reviews

The Top 10, Top Predictions for 2012

Around this time of year, almost everyone and their brother put out their annual predictions for the coming year.  So instead of coming up with my own, I figured I’d simply regurgitate what many others are expecting to happen.  ... Read more
0 Reviews

When Personal Security is Compromised

My Greatest Fears RealizedI debated about writing and/or blogging about this for a few days since it is very personal and didn’t want a pity-party coming my way.  But covering security, often from the human behavior standpoint, is what I do... Read more
0 Reviews

SANS 20 Critical Security Controls

A couple days ago, The SANS Institute announced the release of a major update (Version 3.0) to the 20 Critical Controls, a prioritized baseline of information security measures designed to provide continuous monitoring to better protect government... Read more
0 Reviews

Protection from Latest Network and Application Attacks

We offer a lot of webinars at F5 and this is one I recently presented to some partners. As I’ve mentioned, security attacks are moving “up the stack."  90% of security investments are focused on network security, however, 75% of the... Read more
0 Reviews

Custom Code for Targeted Attacks

Botnets?  Old school.  Spam?  So yesterday.  Phishing?  Don’t even bother…well, on second thought.  Spaghetti hacking like spaghetti marketing, toss it and see what sticks, is giving way to specific development of... Read more
0 Reviews

Has The Sky Cleared on Cloud Security?

Last year I embarked on a blog series, lead by my trusty advisor CloudFucius, that evolved into an exploration of the numerous cloud computing surveys, reports, statistics and other feelings about the technology.  At the time, 4-5 surveys a... Read more
0 Reviews

Quarantine First to Mitigate Risk of VM App Stores

Internal processes may be the best answer to mitigating risks associated with third-party virtual appliances The enterprise data center is, in most cases, what aquarists would call a “closed system.” This is to say that from a systems and... Read more
0 Reviews

A Digital Poltergeist On Your Television

I love starting blogs with, ‘Remember when…’ and this is no different.  Remember when, we used to receive our television programming over the air via an antenna?  Many still do but the days of seeing a huge pointy metal object perched on... Read more
0 Reviews