Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Security’s FUD Factor

Had a short but interesting twitter exchange with @securityincite @Gillis57 and @essobi ‏(Mike Rothman, Gillis Jones and not sure (sorry!!) respectively) about using Fear, Uncertainty and Doubt when talking... Read more
0 Reviews

You’ll Shoot Your Eye Out…

…is probably one of the most memorable lines of any Holiday Classic.  Of course I’m referring to A Christmas Story, where a young Ralphie tries to convince his parents, teachers and Santa that the Red Ryder BB Gun is the perfect... Read more
0 Reviews

Holiday Shopping SmartPhone Style

Close to 70% of smartphone owners plan to use the devices for holiday shopping, according to Deloitte (pdf).  Smartphone ownership has jumped from 39.7% last year to 46.1% this year and tablet owners have doubled from 10.5% to 22.4% according... Read more
0 Reviews

BYOD Policies – More than an IT Issue Part 5: Trust Model

#BYOD or Bring Your Own Device has moved from trend to an permanent fixture in today's corporate IT infrastructure. It is not strictly an IT issue however. Many groups within an organization need to be involved as they grapple with the risk of... Read more
0 Reviews

The Venerable Vulnerable Cloud

Ever since cloud computing burst onto the technology scene a few short years ago, Security has always been a top concern.  It was cited as the biggest hurdle in many surveys over the years and in 2010, I covered a lot of those in my... Read more
0 Reviews

Freedom vs. Control

No sooner had I posted BYOD–The Hottest Trend or Just the Hottest Term, last week than yet another BYOD survey hit the news.  The full results will be released in a webinar tomorrow but SANS announced their First Annual Survey Results on... Read more
0 Reviews

Surfing the Surveys: Cloud, Security and those Pesky Breaches

While I’m not the biggest fan of taking surveys, I sure love the data/reports that are generated by such creatures.  And boy has there been a bunch of recent statistical information released on cloud computing, information security, breaches... Read more
0 Reviews

ICSA Certified Network Firewall for Data Centers

The BIG-IP platform is now ICSA Certified as a Network Firewall.Internet threats are widely varied and multi-layered. Although applications and their data are attackers’ primary targets, many attackers gain entry at the network layer. ... Read more
0 Reviews

Security’s Rough Ride

1 if by land, 2 of by sea, 0 if by IPI know I’ve said this before but it sure seems like almost daily there is a security breach somewhere.  Over the years, the thought process has changed from prevent all attacks to, it is inevitable that we... Read more
0 Reviews

Cloud Security With FedRAMP

Want to provide Cloud services to the federal government?  Then you’ll have to adhere to almost 170 security controls under the recently announced Federal Risk and Authorization Management Program.  The program, set to go live in June,... Read more
0 Reviews

F5 Security Vignette Series

Over the last couple weeks, we’ve been rolling out a series of short Security Vignette videos about various IT security challenges.  We’ve posted them to the F5News blog account but also wanted to share in case you missed them.  If we... Read more
0 Reviews

2012 IT Staffing Crisis?

After just proclaiming, a mere four days ago in The Top 10, Top Predictions for 2012, that I wouldn’t predict anything for 2012 and simply would repurpose other’s predictions, I offer this prognosis. An area I have been thinking about recently is... Read more
0 Reviews

Dynamic Attack Protection and Access Control with BIG-IP v11

We try to offer many learning opportunities thru webinars so if there are other topics you’re interested in, there are some links below but also check out the F5 WebCasts page along with DevCentral’s Media site.  We also post video content to... Read more
0 Reviews

F5 BIG-IP Platform Security

When creating any security-enabled network device, development teams must fully investigate security of the device itself to ensure it cannot be compromised.  A gate provides no security to a house if the gap between the bars is large enough... Read more
0 Reviews

When Personal Security is Compromised

My Greatest Fears RealizedI debated about writing and/or blogging about this for a few days since it is very personal and didn’t want a pity-party coming my way.  But covering security, often from the human behavior standpoint, is what I do... Read more
0 Reviews