Cybersecurity Evangelist | F5

The OWASP top ten API security vulnerabilities list clearly identifies the central role bots play in attacks on APIs.
By Jim DowneyThe 2025 OWASP Top 10 Security Risks for LLMs report reveals how common bot-driven attacks probe and exploit the vulnerabilities of large language models.
By Jim DowneyAdding F5 Distributed Cloud Bot Defense to F5 BIG-IP Access Policy Manager (APM) protects user accounts against real-time phishing proxies.
By Jim DowneyThe Forrester Wave™: Bot Management Software, Q3 2024 recently named F5 Distributed Cloud Bot Defense a strong performer, recognizing F5 as “the only vendor whose mobile SDK can extend into a mobile a...
By Jim DowneyF5 named a strong performer in the Forrester Wave™: Bot Management Software, recognizing F5's strong SaaS-based offering for bot defense.
By Jim DowneyCombat Gen AI risks with robust content scraping protection, securing your digital assets against AI-driven theft and unauthorized data collection.
By Jim DowneyCybercrime is evolving with the use of AI for phishing. Learn how generative AI enables automation of spear phishing and what that means for cybersecurity.
By Jim DowneyData scraping by bots puts personal data privacy at risk. Learn what your organization can do to protect data security compliance efforts.
By Jim DowneyEnterprises need to take additional measures to bolster the security of MFA, including bot mitigation and the monitoring of contextual risk.
By Jim DowneyBots cause tremendous financial pain. Not only is the impact large, the likelihood of an attack for businesses online is nearly 100 percent because the attacks are so lucrative for criminals.
By Jim DowneyWith F5's participation, the Global Privacy Assembly recently published the first intergovernmental guidelines on credential stuffing asserting that this type of threat poses a risk to personal data o...
By Jim Downey