Since F5’s participation as a launch partner in both the AWS Marketplace Consulting Partner Private Offers (CPPO) and standard Private Offer programs, we have continued to advance our cloud-enabled se...
By Dave MorrisseyAttention online retailers and e-commerce vendors: When it comes to protecting client-side data and online payments against digital skimming and Magecart attacks, there’s a new sheriff in town.
By Angel GrantWhy has online fraud become so severe? Changes in consumer behavior, such as a rise in online shopping along with greater adoption of digital payments, have provided more targets for fraud. Buy Now, P...
By Beth McElroyWhile digital transformation efforts continue to accelerate, industries face a major challenge: ensuring application security against malicious bots to minimize business impact. The first task? Explai...
By Niloufar TayebiLearn how artificial intelligence and machine learning aid in mitigating cybersecurity threats to your IT automation processes.
By Lori Mac VittieAdopting a curiosity mindset means replacing, conceptually, the outcome of learning with the process itself. In cybersecurity, this can be a critical trait because bad actors actively aim to exploit t...
By Ian LauthPowered by technology from Threat Stack, F5 Distributed Cloud AIP delivers comprehensive telemetry and high-efficacy intrusion detection for cloud-native workloads. Customers can now better address a ...
By Mike RauF5 Threat Campaigns is an intelligence service that accurately detects and blocks current and ongoing attack campaigns with virtually no false positives. It leverages a team of security experts dedica...
By Joel CohenFraud keeps increasing in sophistication, often carried out by organized gangs of cybercriminals. As threat actors relentlessly change techniques to bypass security defenses, IT security teams find th...
By Beth McElroyThe explosive and expansive use of APIs is contributing to the rise of headless architecture and providing GraphQL a prominent place in this neomodern application architecture.
By Lori Mac VittieWith all the greatness digital transformation initiatives can bring, they also come with considerable challenges. In the public sector, this has slowed adoption of many modern investments over the yea...
By Chad DavisF5 Chief People Officer Ana White is spearheading an ambitious plan to transform F5’s culture—making the company both human-first and high-performance.
By Andrea CarlosF5 Distributed Cloud Web App and API Protection (WAAP) is dedicated to ensuring that NetOps, SecOps, and DevSecOps professionals can access holistic views with their favorite SIEM vendor platforms.
By Scott LasterApplication Programming Interfaces, or APIs, are all the rage. While APIs are not new, recent phenomena such as accelerated digital transformation during COVID-19, enhanced software integrations, and ...
By Byron McNaughtJay Kelley, Senior Manager and Security Product Marketing Lead at F5, flags some of the top World Cup scams and IT challenges to look out for.
By Jay Kelley
NGINX Plus R28 introduces TLS metrics for handshake errors and certificate verification failures, support for PROXY protocol v2 in cloud private services, and more.
By Robert HaynesCyberthreats have become increasingly prevalent and sophisticated, giving security teams little choice but to invest heavily in the latest and greatest technologies to protect their application portfo...
By Tom AtkinsBusinesses are on a digital transformation journey and the quality of their digital services impact the digital experience of their consumers—be it human, software, or system. App delivery and securit...
By Lori Mac VittieTo understand why—or why not (yet)—companies have implemented TLS 1.3, F5 sponsored the Enterprise Management Associates (EMA) research report, “TLS 1.3’s Fourth Anniversary: What Have We Learned Abou...
By Rachael ShahWith so many competing priorities within public sector agencies, both in IT departments and agency-wide, it can be difficult to realize any meaningful digital transformation gains. Nonetheless, agenci...
By Chad DavisF5 Distributed Cloud Bot Defense and AWS CloudFront CDN combine to help organizations deliver secure and engaging customer experiences that are low friction. With AWS, you get the power of their distr...
By Peter ZavlarisAs we mark National STEM Day, Executive Vice President Kara Sprague honors F5’s 2022 STEM Education Grant partners—10 nonprofits working hard to encourage more women and girls around the globe pursue ...
By Kara SpragueBlockchain, decentralized applications, and the various protocols surrounding them are growing quickly. Kevin Jones highlights the importance of a security-first mindset and DevSecOps culture to prote...
By Kevin JonesToday’s xPU technology is the enabler for economies of scale because it exponentially improves performance and drives digital transformation through a specialized piece of hardware that contains speci...
By Tabitha R. R. PowellWith an integration between ExternalDNS and NGINX Ingress Controller, you can use the Kubernetes API to make resources discoverable via public DNS servers across multiple clusters and cloud-vendor reg...
By Amir Rawdat
NGINX JavaScript module (njs) 0.7.7 makes it easier than ever to customize your NGINX configuration, with local declaration of JavaScript code, context-dependent behavior control, and a new FileHandle...
By Prabhat DixitOrganizations hold latent value—in the form of internal APIs—that they need to tap into in order to compete in an API economy. While security and technical challenges may deter some, businesses need t...
By Rajesh NarayananHow do online accounts get taken over by cybercriminals to commit fraud, and what can users do to protect themselves and safeguard their personal credentials?
By Frank Kyei-ManuGet started on your deployment of NGINX Open Source or NGINX Plus with these links to the official NGINX repo, installation instructions, and our free on-demand webinar.
By Robert HaynesZero trust security is not achieved with the implementation of one specific technology product. It is a mindset that embraces a set of assumptions, which results in the use of distinct tools and techn...
By Lori Mac Vittie