CISOs: What would you do over?
Just after the new year I was catching up with a CISO over lunch in Pike Place Market in Seattle. We were reminiscing about how tough it is to get a security program up and …
Just after the new year I was catching up with a CISO over lunch in Pike Place Market in Seattle. We were reminiscing about how tough it is to get a security program up and …
CVE-2019-1573, a flaw that makes VPN applications store the authentication and/or session cookies insecurely (i.e. unencrypted) in memory and/or log files, affects a yet to be …
Guardicore launches freely available public resource for investigating malicious IP addresses and domains Guardicore Threat Intelligence is a freely available public resource …
F5 Networks extends its portfolio with a new delivery model that leverages the AWS SaaS Enablement Framework for its market-leading application services. F5 Cloud Services …
In the past year or so, many cybercriminals have turned to cryptojacking as an easier and more low-key approach for “earning” money. While the value of …
F5 Networks and NGINX announced a definitive agreement under which F5 will acquire all issued and outstanding shares of privately held NGINX for a total enterprise value of …
F5 Networks announced the availability of a joint solution with Equinix, the global interconnection and data center company, that provides automated HSM (hardware security …
The 2019 State of Application Services report from F5 Networks showed that organizations regard application services as vital for cloud adoption and, ultimately, for success …
Computer geeks love their acronyms. Here’s one more: TANSTAAFL. There ain’t no such thing as a free lunch. No, I’m not talking about the grilled Alaskan salmon meal you …
We who live risk management know there are four responses when confronted with a credible risk to our organizations. We can treat the risk to reduce it. We can avoid the risk …
In my year-long research project, the F5 Labs’ 2018 Application Protection Report, I asked if security professionals used storage encryption for data and applications. About …
In July 2018, F5 released its first annual Application Protection Report. As part of the report, F5 commissioned Ponemon to survey of 3,135 IT security practitioners across …