2017 blog posts

2017 blog posts(103)

Five Predictions for 2018 You Can Pretty Much Bank On
F5 Ecosystem | 12/21/2017

Five Predictions for 2018 You Can Pretty Much Bank On

Lori MacVittie decided to put down in digital ink what the data and technology cycle is showing will be pretty much a given in 2018.

By Lori Mac Vittie
Another Year of re:Invent, Another Year of Advances for F5 on AWS
F5 Ecosystem | 12/13/2017

Another Year of re:Invent, Another Year of Advances for F5 on AWS

F5's Chad Whalen reflects on the significant advancements F5 has made with AWS following an amazing week at AWS re:Invent.

By Chad Whalen
The Risks of Running HTTP are Increasing but Manageable
F5 Ecosystem | 11/06/2017

The Risks of Running HTTP are Increasing but Manageable

Whether we like it or not, HTTP is the de facto application transport protocol of the modern age. We use it everywhere. It’s as ubiquitous as IP and TCP, and serves much the same purpose. Its only goa...

By Lori Mac Vittie
The New OSI Network Stack: Containers and Half-Layers
F5 Ecosystem | 10/30/2017

The New OSI Network Stack: Containers and Half-Layers

Back in 1983, a group of like-minded folks in the computer and telecom industries got together to create a detailed specification they called the Open Systems Interconnection (OSI).

By Lori Mac Vittie
Why CVEs Should Be Given Priority One for Resolution
F5 Ecosystem | 10/23/2017

Why CVEs Should Be Given Priority One for Resolution

When considering vulnerabilities, remember application security is a stack. You may have heard me say this before, but sometimes we need a reminder that modern applications are never deployed alone.

By Lori Mac Vittie
Where does a WAF fit in the data path?
F5 Ecosystem | 10/19/2017

Where does a WAF fit in the data path?

The data path contains multiple insertion points at which a WAF can be deployed. But that doesn’t mean every insertion point is a good idea.

By Lori Mac Vittie
Dear NetOps: Security Rule Zero Applies to You  Too
F5 Ecosystem | 10/12/2017

Dear NetOps: Security Rule Zero Applies to You Too

Okay, NetOps. As you’re getting all automated up and scripting your hearts out, it’s time for a gentle reminder about security. I’m not talking about firewalls and WAF or other security services you m...

By Lori Mac Vittie
F5 BIG-IP Availability on IBM Cloud for VMware Solutions
F5 Ecosystem | 10/09/2017

F5 BIG-IP Availability on IBM Cloud for VMware Solutions

For most enterprises, the concept of cloud is well in the process of crossing the “chasm” from early adoption to early majority.

By Craig Scarborough
Example-driven Insecurity Illustrates Need for WAF
F5 Ecosystem | 10/05/2017

Example-driven Insecurity Illustrates Need for WAF

Learning online is big. Especially for those who self-identify as a developer. If you take a peek at Stack Overflow’s annual developer survey...

By Lori Mac Vittie
Ceding Control of IoT for the Sake of Security
F5 Ecosystem | 09/21/2017

Ceding Control of IoT for the Sake of Security

We are, I think it’s safe to say, universally delighted by technology. The mundane is transformed into the magical by the mere introduction of technology. The novelty wears off after a time, of course...

By Lori Mac Vittie
Vulnerable Stuff Running in Containers Still Vulnerable Stuff
F5 Ecosystem | 09/15/2017

Vulnerable Stuff Running in Containers Still Vulnerable Stuff

It has been said – and not just by me – that encrypted malicious code is still malicious code. The encryption does nothing to change that...

By Lori Mac Vittie
Results 1-30 of 103
Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us