Please turn on your JavaScript for this page to function normally.
person
CISOs: What would you do over?

Just after the new year I was catching up with a CISO over lunch in Pike Place Market in Seattle. We were reminiscing about how tough it is to get a security program up and …

tunnel light
Enterprise VPN apps store authentication and session cookies insecurely

CVE-2019-1573, a flaw that makes VPN applications store the authentication and/or session cookies insecurely (i.e. unencrypted) in memory and/or log files, affects a yet to be …

XebiaLabs DevOps
New infosec products of the week: March 29, 2019

Guardicore launches freely available public resource for investigating malicious IP addresses and domains Guardicore Threat Intelligence is a freely available public resource …

F5’s new delivery model leverages the AWS SaaS Enablement Framework

F5 Networks extends its portfolio with a new delivery model that leverages the AWS SaaS Enablement Framework for its market-leading application services. F5 Cloud Services …

cybercrime
Cryptojacking of businesses’ cloud resources still going strong

In the past year or so, many cybercriminals have turned to cryptojacking as an easier and more low-key approach for “earning” money. While the value of …

F5 acquires NGINX, enableing multi-cloud application services across all environments

F5 Networks and NGINX announced a definitive agreement under which F5 will acquire all issued and outstanding shares of privately held NGINX for a total enterprise value of …

handshake
F5 Networks teams with Equinix to enhance security

F5 Networks announced the availability of a joint solution with Equinix, the global interconnection and data center company, that provides automated HSM (hardware security …

F5 report
How IT organizations are transforming to meet the demands of the digital economy

The 2019 State of Application Services report from F5 Networks showed that organizations regard application services as vital for cloud adoption and, ultimately, for success …

magnifying glass
Shifting the burden: Long-term magnifying consequences

Computer geeks love their acronyms. Here’s one more: TANSTAAFL. There ain’t no such thing as a free lunch. No, I’m not talking about the grilled Alaskan salmon meal you …

risk
Don’t accept risk with a pocket veto

We who live risk management know there are four responses when confronted with a credible risk to our organizations. We can treat the risk to reduce it. We can avoid the risk …

vault
What do you mean by storage encryption?

In my year-long research project, the F5 Labs’ 2018 Application Protection Report, I asked if security professionals used storage encryption for data and applications. About …

door
Who owns application security?

In July 2018, F5 released its first annual Application Protection Report. As part of the report, F5 commissioned Ponemon to survey of 3,135 IT security practitioners across …

Don't miss

Cybersecurity news