F5 Blog

Buy, Not Bye

It's an all too common scenario where you're not able to login to an e-commerce site without jumping through hoops (forgotten password, reauthentication, email verification—but which email?). This post explores strategies organizations are implementing to spare authentic human users from all this friction, and avoid the associated lost revenue.

Secure the FDX API to Defend Data in Open Banking

Cybercriminals targeting the financial services sector are focusing more of their attacks on application programming interfaces (APIs). At the same time, different development teams working on multiple applications often use disparate tool sets, pointing to the increasing importance of industry standards. F5 works closely with financial services customers worldwide to implement and secure the APIs driving open banking.

Half the World’s Malware is Now Encrypted

Encryption, while helpful in protecting users’ data privacy, can create serious risks for enterprises if not properly decrypted and inspected for malicious payloads. While no-cost and readily available TLS certificates allow application hosts to cheaply protect their users’ data privacy, bad actors can also hide malware behind a certificate. And it’s becoming increasingly easier for them to do so.

10 Questions to Ask a Bot-Mitigation Vendor

You suspect that you have a bot problem, and—after preliminary investigation—you’ve decided to call in professionals to help reclaim some of your time. You’ve narrowed it down to a few vendors, but how do you decide? Here are some good questions that can give you an idea if a bot mitigation vendor’s solution is the right fit for your environment.

F5 Celebrates AAPI Heritage Month

F5 celebrates the contributions that generations of Asian Americans and Pacific Islanders have made to American history, society, and culture.

Increasing Diversity of Location and Users is Driving Business to the Edge

User, within the context of the application domain, has always referred to the entity that interacts with an application. Just as shifts in application architectures drive changes in the technologies that deliver and secure them, shifts in the definition of user have driven changes in where apps are deployed.

Join Us For a Fireside Chat About Edge at ONUG

Edge is one of the hottest topics in technology right now. An increasingly distributed society, workforce, and reliance on digital interactions have driven edge to the forefront of conversation as business faces challenges with security and delivery of the digital services that connect us all.

State of Application Strategy 2021: Unpacking the Current and Future State of Application Security and Delivery*

You might have noticed a few changes at F5 over the past year. First, we’re just F5 now. Not F5 Networks. Just F5. Because honestly, we’ve never been centered on the network.

DNS Management Just Got Easier with General Availability of Primary DNS Service on F5 Cloud DNS

As enterprises pursue DNS solutions capable of supporting adaptive applications, they look for solutions that match their need for automation, speed, and ability to respond to infrastructure changes in seconds rather than hours. F5 Cloud DNS promotes modern DevOps practices, helping to speed new application rollouts by adding DNS updates seamlessly into surrounding process elements.

3 Tips for Maintaining a High-Performing App Portfolio

Maintaining a healthy application portfolio is a like maintaining a healthy body. Both are subject to endless stresses and unanticipated conditions. Both require specific care, proactive maintenance, and targeted interventions. Over time, eating right and exercising regularly go a long way toward keeping your day-to-day running smoothly, and the same is true metaphorically for your apps.