Lori MacVittie decided to put down in digital ink what the data and technology cycle is showing will be pretty much a given in 2018.
By Lori Mac VittieF5's Chad Whalen reflects on the significant advancements F5 has made with AWS following an amazing week at AWS re:Invent.
By Chad WhalenWhether we like it or not, HTTP is the de facto application transport protocol of the modern age. We use it everywhere. It’s as ubiquitous as IP and TCP, and serves much the same purpose. Its only goa...
By Lori Mac VittieBack in 1983, a group of like-minded folks in the computer and telecom industries got together to create a detailed specification they called the Open Systems Interconnection (OSI).
By Lori Mac VittieWhen considering vulnerabilities, remember application security is a stack. You may have heard me say this before, but sometimes we need a reminder that modern applications are never deployed alone.
By Lori Mac VittieThe data path contains multiple insertion points at which a WAF can be deployed. But that doesn’t mean every insertion point is a good idea.
By Lori Mac VittieOkay, NetOps. As you’re getting all automated up and scripting your hearts out, it’s time for a gentle reminder about security. I’m not talking about firewalls and WAF or other security services you m...
By Lori Mac VittieFor most enterprises, the concept of cloud is well in the process of crossing the “chasm” from early adoption to early majority.
By Craig ScarboroughLearning online is big. Especially for those who self-identify as a developer. If you take a peek at Stack Overflow’s annual developer survey...
By Lori Mac VittieWe are, I think it’s safe to say, universally delighted by technology. The mundane is transformed into the magical by the mere introduction of technology. The novelty wears off after a time, of course...
By Lori Mac VittieIt has been said – and not just by me – that encrypted malicious code is still malicious code. The encryption does nothing to change that...
By Lori Mac Vittie