Blog de F5

FILTRAR BLOGS POR:
Solución
  • Application Security
  • Automation & Orchestration
  • Cloud
  • Traffic Management
  • Service Provider
PRODUCTO
  • Security
  • BIG-IP
  • Automation & Orchestration
  • Platforms
Año

The Courage to Ask, “What If?”

F5 announces our 2022 Tech for Good grant recipients—25 NGOs working to build more vibrant communities around the globe.

Preventing Healthcare Fraud and Protecting Patient Data

Learn how to prevent fraudulent healthcare claims and payouts by mitigating common identity theft and account takeover attacks with these tips and F5 solutions.

State of Application Strategy 2022: Edge Workloads Expanding to Apps and Data

Many organizations are planning to deploy data and app distribution workloads at the edge, but to do that will require an edge application platform capable of supporting those workloads. That platform will need to meet the needs of new application patterns and focus on both the ops experience and flow of data and control.

F5 Labs Shows Evolving Threat Landscape in Latest Application Protection Report

F5 Labs recently published its annual Application Protection Report, synthesizing data from several sources to understand the evolution of the threat landscape over time, the relationship between organizations’ characteristics and the attack techniques they face, and—most importantly—what security practitioners can do to mitigate the risks.

The Third Wave of the Internet is Driving the Need for a New Edge Platform

Edge computing is under pressure to simultaneously evolve with each wave of the internet. As we ride the third wave, this next evolution demands the creation of a platform to support new capabilities within the edge ecosystem. A platform that cannot simply be bolted together, but requires a new approach with design considerations at the architectural level.

Meet the Minds behind F5’s Advanced Threat Research Center of Excellence (ATRCoE)

Not even the stealthiest threats can hide from F5's Advanced Threat Research Center of Excellence. The team conducts rigorous research to unravel the details of today's cybersecurity threats and then shares their insights to help shut them down.

Catalysts of F5 NGINX for Azure

Christine Puccio looks at market and industry trends that point to the value F5 creates in broadening the ways customers can leverage popular commercial marketplaces to procure, consume, and expand the use of solutions from the company’s growing software and SaaS portfolio.

Balancing Risk and Innovation: Security’s Mission Impossible?

Today, security must fulfill multiple roles: enabler of digital transformation, steward of customer trust, and bulwark of organizational reputation. As an essential element of business success, aligning a company's perception of security as a mindset instead of just a feature represents a cultural change that requires time and effort.

7 (More) Cybersecurity Myths that are Harming Your Business

It's been two years since Dan Woods flagged 7 notable cybersecurity myths plaguing organizations. Since then, the world has been shocked economically, politically, and technologically, bringing into focus an additional 7 myths that continue to trip up IT teams.

The Role of Certificates

Guest blogger Sean Wright explores the purpose of certificates and why they play an important role in securing TLS connections.