Bylines

The Ethical and Legal Dilemmas of Threat Researchers

/ Jul 12, 2018

By ray pompon

F5 Labs' Ray Pompon writes for HelpNetSecurity, discussing the grey areas of threat research and some common issues researchers encounter.

How Digital Transformation is Making the Anonymous Personal

/ Jul 5, 2018

By preston hogue

F5 Labs' Preston Hogue writes for SecurityWeek, discussing how the trend towards digital transformation is bringing data together in a way that provides intelligence to malicious actors.

Spring 2018 Password Attacks

/ Jun 20, 2018

By david holmes

David Holmes writes for Security Week, discussing how 90-day password expirations could be making it easier for attackers to brute-force your network.

The Eternal Struggle: Security Versus Users

/ Jun 7, 2018

By ray pompon

F5 Labs writes for Help Net Security, explaining how to deal with the often-adversarial relationship between security professionals and the users they support.

Risky Business: The Fifth Element

/ May 8, 2018

By preston hogue

Preston Hogue writes for Security Week, explaining the fifth element of risk transfer: Sec-aaS.

5 Fun Facts About the 2018 Singapore Cybersecurity Statute

/ Apr 19, 2018

By david holmes

Fun Fact #2: the author is looking forward to being a card-carrying Singaporean crime fighter (temporarily) someday.

Avoid Becoming a Crypto-Mining Bot: Where to Look for Mining Malware and How to Respond

/ Apr 3, 2018

By david holmes

People are mining coins all over the place-all it costs is money for the power bill. So, of course, clever people are figuring out how to use other people’s power to mine cryptocurrency.

IoT: Moving to Security by Design

/ Mar 27, 2018

By david holmes

With device developers rushing to build IoT as fast as they can, security can suffer.

Reacting to a Big Breach

/ Mar 15, 2018

By ray pompon

A big public breach is a teachable moment for both you and your organization.

Threat Modeling the Internet of Things: Modeling Reaper

/ Mar 9, 2018

By david holmes

Reaper is just one more blinking light in the faces of the InfoSec community reminding us that we need to get ahead of IOT madness.

User Experience and Security Should be Complementary, Not Contradictory

/ Feb 23, 2018

By preston hogue

When new technology initiatives are approached in the right way, organizations can implement them, mitigate risk, and provide the best user experience.

Risky Business (Part 3): The Beauty of Risk Transfer

/ Feb 13, 2018

By preston hogue

Risk transfer strategies allow you more time to focus on your business.

Risky Business (Part 2): Why You Need a Risk Treatment Plan

/ Jan 12, 2018

By preston hogue

Performing a risk analysis and taking due care are no longer optional.

Risky Business: Understand Your Assets and Align Security with the Business

/ Dec 19, 2017 (MODIFIED: Jan 18, 2018)

By preston hogue

Security teams can fulfill the CISOs responsibilities and help business groups become more security-savvy by working through the due diligence and due care process together.

To Protect Your Network, You Must First Know Your Network

/ Dec 13, 2017 (MODIFIED: Jan 12, 2018)

By ray pompon

Strong security starts with understanding exactly what you need to protect and where it resides within your organization.

The Good, the Bad and the Ugly: Bitcoin and Cryptocurrencies

/ Dec 1, 2017

By david holmes

F5 Labs' David Holmes writes for LinkedIn, discussing whether cryptocurrencies are a scam or a revolution.

When Securing Your Applications, Seeing Is Believing

/ Aug 24, 2016 (MODIFIED: Dec 28, 2017)

By mike convertino

While the cloud is amazing, a worrying lack of visibility goes along with it. I've written about things to keep in mind when developing a security approach, over on Dark Reading.

Privacy and Security: Where Do We Go From Here?

/ Jun 21, 2016 (MODIFIED: Dec 28, 2017)

By mike convertino

Some of you may remember a time when national security was a question of the Army’s defence against international threats. Today, that picture looks very different. If anything,...

Follow us on social media.