2022 blog posts

2022 blog posts(122)

F5 Simplifies Purchasing F5 Security, Container, Analytics, and Networking Services on AWS
F5 Ecosystem | 01/04/2023

F5 Simplifies Purchasing F5 Security, Container, Analytics, and Networking Services on AWS

Since F5’s participation as a launch partner in both the AWS Marketplace Consulting Partner Private Offers (CPPO) and standard Private Offer programs, we have continued to advance our cloud-enabled se...

By Dave Morrissey
Act Now: New PCI DSS v4.0 Requirements Address Browser-Based Attacks
F5 Ecosystem | 01/03/2023

Act Now: New PCI DSS v4.0 Requirements Address Browser-Based Attacks

Attention online retailers and e-commerce vendors: When it comes to protecting client-side data and online payments against digital skimming and Magecart attacks, there’s a new sheriff in town.

By Angel Grant
Stop Online Fraud without Adding Friction
F5 Ecosystem | 12/23/2022

Stop Online Fraud without Adding Friction

Why has online fraud become so severe? Changes in consumer behavior, such as a rise in online shopping along with greater adoption of digital payments, have provided more targets for fraud. Buy Now, P...

By Beth McElroy
Understanding the Business Impact of Bots
F5 Ecosystem | 12/20/2022

Understanding the Business Impact of Bots

While digital transformation efforts continue to accelerate, industries face a major challenge: ensuring application security against malicious bots to minimize business impact. The first task? Explai...

By Niloufar Tayebi
Using AI for IT Automation Security
F5 Ecosystem | 12/19/2022

Using AI for IT Automation Security

Learn how artificial intelligence and machine learning aid in mitigating cybersecurity threats to your IT automation processes.

By Lori Mac Vittie
Cybersecurity Requires a Curiosity Mindset
F5 Ecosystem | 12/19/2022

Cybersecurity Requires a Curiosity Mindset

Adopting a curiosity mindset means replacing, conceptually, the outcome of learning with the process itself. In cybersecurity, this can be a critical trait because bad actors actively aim to exploit t...

By Ian Lauth
Enhancing Modern App Security: Introducing F5 Distributed Cloud App Infrastructure Protection
F5 Ecosystem | 12/15/2022

Enhancing Modern App Security: Introducing F5 Distributed Cloud App Infrastructure Protection

Powered by technology from Threat Stack, F5 Distributed Cloud AIP delivers comprehensive telemetry and high-efficacy intrusion detection for cloud-native workloads. Customers can now better address a ...

By Mike Rau
Leveraging Intelligence to Protect against Real-World Attacks (with Zero Effort)
F5 Ecosystem | 12/14/2022

Leveraging Intelligence to Protect against Real-World Attacks (with Zero Effort)

F5 Threat Campaigns is an intelligence service that accurately detects and blocks current and ongoing attack campaigns with virtually no false positives. It leverages a team of security experts dedica...

By Joel Cohen
F5 and Google Cloud Secure Adaptive Applications
F5 Ecosystem | 12/12/2022

F5 and Google Cloud Secure Adaptive Applications

Fraud keeps increasing in sophistication, often carried out by organized gangs of cybercriminals. As threat actors relentlessly change techniques to bypass security defenses, IT security teams find th...

By Beth McElroy
Headless architecture is on the rise
F5 Ecosystem | 12/12/2022

Headless architecture is on the rise

The explosive and expansive use of APIs is contributing to the rise of headless architecture and providing GraphQL a prominent place in this neomodern application architecture.

By Lori Mac Vittie
Why Digital Transformation in the Public Sector Remains a Major Focus this Year – Part 2, Strategic Approach and Challenges
F5 Ecosystem | 12/08/2022

Why Digital Transformation in the Public Sector Remains a Major Focus this Year – Part 2, Strategic Approach and Challenges

With all the greatness digital transformation initiatives can bring, they also come with considerable challenges. In the public sector, this has slowed adoption of many modern investments over the yea...

By Chad Davis
Ana White: Making F5 a Great Place to Work
F5 Ecosystem | 12/07/2022

Ana White: Making F5 a Great Place to Work

F5 Chief People Officer Ana White is spearheading an ambitious plan to transform F5’s culture—making the company both human-first and high-performance.

By Andrea Carlos
F5 Distributed Cloud Services Enables Analytics with Datadog and Splunk
F5 Ecosystem | 12/06/2022

F5 Distributed Cloud Services Enables Analytics with Datadog and Splunk

F5 Distributed Cloud Web App and API Protection (WAAP) is dedicated to ensuring that NetOps, SecOps, and DevSecOps professionals can access holistic views with their favorite SIEM vendor platforms.

By Scott Laster
Mastering API Architecture: API Fundamentals
F5 Ecosystem | 12/05/2022

Mastering API Architecture: API Fundamentals

Application Programming Interfaces, or APIs, are all the rage. While APIs are not new, recent phenomena such as accelerated digital transformation during COVID-19, enhanced software integrations, and ...

By Byron McNaught
A World Cup of Phishing and Cyberattacks
F5 Ecosystem | 12/02/2022

A World Cup of Phishing and Cyberattacks

Jay Kelley, Senior Manager and Security Product Marketing Lead at F5, flags some of the top World Cup scams and IT challenges to look out for.

By Jay Kelley
Announcing NGINX Plus R28
NGINX | 11/29/2022

Announcing NGINX Plus R28

NGINX Plus R28 introduces TLS metrics for handshake errors and certificate verification failures, support for PROXY protocol v2 in cloud private services, and more.

By Robert Haynes
Centralizing BIG-IP Advanced WAF Threat Visualization, Alerting, and Reporting With Azure Sentinel
F5 Ecosystem | 11/22/2022

Centralizing BIG-IP Advanced WAF Threat Visualization, Alerting, and Reporting With Azure Sentinel

Cyberthreats have become increasingly prevalent and sophisticated, giving security teams little choice but to invest heavily in the latest and greatest technologies to protect their application portfo...

By Tom Atkins
What is a Digital Service?
F5 Ecosystem | 11/21/2022

What is a Digital Service?

Businesses are on a digital transformation journey and the quality of their digital services impact the digital experience of their consumers—be it human, software, or system. App delivery and securit...

By Lori Mac Vittie
New Study Reveals What’s Driving—and Limiting—TLS 1.3 Implementation
F5 Ecosystem | 11/18/2022

New Study Reveals What’s Driving—and Limiting—TLS 1.3 Implementation

To understand why—or why not (yet)—companies have implemented TLS 1.3, F5 sponsored the Enterprise Management Associates (EMA) research report, “TLS 1.3’s Fourth Anniversary: What Have We Learned Abou...

By Rachael Shah
Why Digital Transformation in the Public Sector Remains a Major Focus this Year – Part 1, Priorities
F5 Ecosystem | 11/17/2022

Why Digital Transformation in the Public Sector Remains a Major Focus this Year – Part 1, Priorities

With so many competing priorities within public sector agencies, both in IT departments and agency-wide, it can be difficult to realize any meaningful digital transformation gains. Nonetheless, agenci...

By Chad Davis
Introducing the F5 Distributed Cloud Bot Defense Connector for AWS CloudFront CDN
F5 Ecosystem | 11/15/2022

Introducing the F5 Distributed Cloud Bot Defense Connector for AWS CloudFront CDN

F5 Distributed Cloud Bot Defense and AWS CloudFront CDN combine to help organizations deliver secure and engaging customer experiences that are low friction. With AWS, you get the power of their distr...

By Peter Zavlaris
Expanding STEM Career Paths for Women and Girls of Color
F5 Ecosystem | 11/08/2022

Expanding STEM Career Paths for Women and Girls of Color

As we mark National STEM Day, Executive Vice President Kara Sprague honors F5’s 2022 STEM Education Grant partners—10 nonprofits working hard to encourage more women and girls around the globe pursue ...

By Kara Sprague
The Importance of DevSecOps in Blockchain, Decentralized Protocols, and Applications
F5 Ecosystem | 10/26/2022

The Importance of DevSecOps in Blockchain, Decentralized Protocols, and Applications

Blockchain, decentralized applications, and the various protocols surrounding them are growing quickly. Kevin Jones highlights the importance of a security-first mindset and DevSecOps culture to prote...

By Kevin Jones
Modern Hardware Enables Digital Business to Scale
F5 Ecosystem | 10/26/2022

Modern Hardware Enables Digital Business to Scale

Today’s xPU technology is the enabler for economies of scale because it exponentially improves performance and drives digital transformation through a specialized piece of hardware that contains speci...

By Tabitha R. R. Powell
Automating Multi-Cluster DNS with NGINX Ingress Controller
NGINX | 10/25/2022

Automating Multi-Cluster DNS with NGINX Ingress Controller

With an integration between ExternalDNS and NGINX Ingress Controller, you can use the Kubernetes API to make resources discoverable via public DNS servers across multiple clusters and cloud-vendor reg...

By Amir Rawdat
Make Your NGINX Config Even More Modular and Reusable with njs 0.7.7
NGINX | 10/20/2022

Make Your NGINX Config Even More Modular and Reusable with njs 0.7.7

NGINX JavaScript module (njs) 0.7.7 makes it easier than ever to customize your NGINX configuration, with local declaration of JavaScript code, context-dependent behavior control, and a new FileHandle...

By Prabhat Dixit
Inverting the API is the Digital Transformation that Enterprises Need to Participate and Compete in an API Economy
F5 Ecosystem | 10/18/2022

Inverting the API is the Digital Transformation that Enterprises Need to Participate and Compete in an API Economy

Organizations hold latent value—in the form of internal APIs—that they need to tap into in order to compete in an API economy. While security and technical challenges may deter some, businesses need t...

By Rajesh Narayanan
How Online Accounts Get Taken Over by Cybercriminals
F5 Ecosystem | 10/18/2022

How Online Accounts Get Taken Over by Cybercriminals

How do online accounts get taken over by cybercriminals to commit fraud, and what can users do to protect themselves and safeguard their personal credentials?

By Frank Kyei-Manu
Back to Basics: Installing NGINX Open Source and NGINX Plus
NGINX | 10/13/2022

Back to Basics: Installing NGINX Open Source and NGINX Plus

Get started on your deployment of NGINX Open Source or NGINX Plus with these links to the official NGINX repo, installation instructions, and our free on-demand webinar.

By Robert Haynes
Three Reasons Adopting Zero Trust Leads to Bot Protection and Web and API Security
F5 Ecosystem | 10/12/2022

Three Reasons Adopting Zero Trust Leads to Bot Protection and Web and API Security

Zero trust security is not achieved with the implementation of one specific technology product. It is a mindset that embraces a set of assumptions, which results in the use of distinct tools and techn...

By Lori Mac Vittie
Results 1-30 of 122
Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us