F5 ブログ

Solving for Security and Reliability of Generative AI

Generative AI comes with benefits, but also with risks. Get valuable insights to solve for AI security and reliability with the data that it handles.

A Journey to Gender Equity: Q&A with Kara Sprague on Breaking Through as a Woman in Cybersecurity

In the sixth Q&A installment of the “A Journey to Gender Equity” blog series, F5 EVP Kara Sprague shares how she ended up in cybersecurity and her advice for women and other underrepresented groups building cybersecurity careers.

Data Masking and How It Differs from Data Leak Prevention

Explore the differences between data masking and data leak prevention strategies and learn about the emerging role of data masking in the era of generative AI.

Untangling Application Security Challenges in the Era of Multi-Cloud API Sprawl

Discover solutions for tackling API sprawl, ensuring runtime protection, and leveraging AI in a world of multi-cloud complexity with a webinar by F5.

Getting Ahead of NIS2: How F5 Can Help

How F5 can help you meet NIS2’s rigorous risk management and reporting requirements.

eBPF: Revolutionizing Security and Observability in 2023

Discover eBPF's impact on security and observability, strategic choice for enterprise cost-cutting, visibility boost, and fueling AI data pipelines.

Helping Veterans Thrive in the Corporate World

One of six employee inclusion groups at F5, the Military Veterans EIG supports veteran employees and recruits military members transitioning to tech careers.

F5 Awards STEM Education Grants to Nonprofits Serving Women & Girls of Color

F5 is thrilled to announce our 2023 F5 STEM Education Grant Partners. These partners offer programs to inspire women & girls of color to pursue STEM careers.

Augment Hybrid Cloud Security and Performance with F5, AWS, and Intel

Leverage F5 to strengthen security, ensure optimal performance, and deliver enhanced IT protection and speed in your hybrid cloud infrastructure.

Buying Your F5 Solutions Through AWS Marketplace to Save Time and Money

Discover how F5 solutions on the AWS Marketplace streamline procurement, enhance security, and bring time and cost savings to your cloud infrastructure.

Protecting Your Atlassian Confluence Deployment from CVE-2023-22515 and More

F5's sophisticated solutions offer comprehensive and consistent security to protect your Confluence instance from unauthorized user additions and a host of other potential threats.

Outsmarting Fraudsters: Do You Have Modern Critical Capabilities to Prevail?

To defend against the proliferation of evolving attacks, organizations must constantly advance the integration of their security and fraud teams and leverage multiple data sources, AI/ML, and data analytics.

F5 Commits to Science-based Target to Significantly Reduce its Environmental Impact by 2030

Since F5 formed its Environmental, Social & Governance (ESG) team in late 2020, one of our biggest goals has been to set a science-based target to reduce F5’s greenhouse gas emissions.

The Rising Threat of Encryption-less Ransomware Attacks

Ransomware cybercriminals continue to evolve their strategies. Rather than encrypting data, they’re simply stealing it and threatening to release it to the public or auction it off.

Mastering the 4 Elements: Fortify Your App Architecture and Increase App and API Security

Achieving balance between 4 foundational tiers of app architecture will allow you to master app and API security for a high-performance, secure environment.

Combat Online Fraud and Increase Revenue with ForgeRock and F5

Stop online fraud by continuously analyzing ForgeRock traffic flows to discern good human traffic from malicious actors. Learn about the F5-ForgeRock connector.

HTTP/2 Rapid Reset Attack Impacting F5 NGINX Products

Update your NGINX configuration to mitigate a possible denial-of-service attack implemented on the server-side portion of the HTTP/2 specification.

7 Critical Capabilities for Mobile App Security: Protecting Your Digital Frontier

Explore the critical capabilities for robust mobile app security and learn how developers can protect their users' data and maintain trust.

Protect Your AWS Architecture and Services Against Ransomware

Explore the vital strategies needed to protect your AWS architecture from ransomware attacks by implementing advanced network, application, and API security.