Sr. Product Marketing Manager | F5


Broken object-level authorization (BOLA) is not a bug but a failure of access controls. Learn how a three-tiered runtime strategy can close the gap and protect data.
By Chaim Peer, Ian Dinno
This release brings exciting, new API discovery options, expanded testing scenarios, and enhanced detection capabilities—all geared toward reducing API security risks while improving overall visibilit...
By Ian DinnoThis excerpt (short preview text) will show under the titlel in the Featured Blogs section, cards, and lister pages only. Not directly on the blog page itself.
By Ian Dinno
Both the scale and complexity of application vulnerabilities are rapidly escalating. Discover why a proactive, multi-layered approach to security testing is critical.
By Ian Dinno
F5 is a finalist in the 2025 SC Awards for Best API Security Solution, highlighting our innovation and leadership in cybersecurity.
By Ian Dinno
Discover how F5 Distributed Cloud Web App Scanning helps uncover AI-enabled app vulnerabilities like prompt injection & data leakage with continuous testing.
By Ian DinnoEMA gives F5 Distributed Cloud DDoS Mitigation a platinum rating—citing F5 for its comprehensive and robust approach.
By Ian DinnoThis award demonstrates F5's continued focus and innovation in advancing information security and protecting the expanding threat surface that APIs represent.
By Ian DinnoThe PCI DSS 4.0.1 update features new requirements focused on the widespread adoption of APIs and the evolution of the apps and infrastructure supporting a growing number of services and interactions ...
By Ian DinnoLearn about the risks and challenges in API security and how modern web app and API protection (WAAP) solutions can address these limitations.
By Ian DinnoDiscover how web app and API protection (WAAP) solutions can enhance app security through streamlined deployment, centralized control, and scalable protection.
By Ian DinnoBreaches like this give us the opportunity to think about how pervasive APIs are, how critical they are for organizations today, and the unique role they can play in the security (or insecurity) of an...
By Ian Dinno