F5 Blog

Breaking Down the Barriers to Girls’ Education in Peru

A recipient of an F5 2021 Tech for Good Grant, Sacred Valley Project is purchasing 27 laptops to help indigenous girls in remote areas of Peru apply for university and study for college entrance exams.

How Security Automation Can Mitigate the Risk in Cybersecurity

The banking and financial services industry has been experiencing digital transformation for several years and customer digital expectations combined with COVID-19 are accelerating key initiatives, such as Open Banking and Platform Banking.

Digital as Default: Dealing with Unintended Consequences

As businesses continue to move toward a “digital as default” operating model the ease of operations results in an increase of complexity – task automation requires more code, digital expansion requires more connections, AI-assisted business requires more data. And complexity is the enemy of security. Therefore businesses will have to adapt their security stack to keep up.

Securing GraphQL APIs with F5 Advanced WAF

Over the past several years, many organizations have been going through a digital transformation, a process which has accelerated due to the COVID19 pandemic.

Securing SAP Fiori HTTP Batched Requests (OData) with F5 Advanced WAF

The HTTP protocol is, for the most part, running the web. It is the communications protocol that drives most internet traffic. New ways of network optimizing internet communications are emerging.

Helping New Mothers Stay Connected During the COVID-19 Pandemic

One of 20 recipients of an F5 2021 Tech for Good Grant, Thriving Families is using these funds to help new mothers obtain the mental health support and community connections and resources they need during the COVID-19 pandemic and beyond.

F5 Collaborates With NIST’s National Cybersecurity Center of Excellence (NCCoE) on “Implementing A Zero Trust Architecture Project”

In a simpler time, securing organizational infrastructure was relatively easy: Most if not all applications, services, and resources necessary for a user – usually an employee – to be productive were available on the network.

Hybrid Work is Driving a Shift to Identity-Centric Security

The explosive growth of automation and digitization along with a trend toward hybrid work models will accelerate the momentum away from IP-based security toward identity-based access strategies.

Making The Hybrid Workplace Work

Offices across the world are opening up again. But how do we optimize them for hybrid working?

Most Missing Insights are Due to Data Bias

As business approaches a default-digital model, it necessarily relies more and more on data. Eliminating bias in that data will be a critical step in ensuring that decisions based on that data will lead to the best outcome possible for customers and the business.