Please turn on your JavaScript for this page to function normally.
risk
Don’t accept risk with a pocket veto

We who live risk management know there are four responses when confronted with a credible risk to our organizations. We can treat the risk to reduce it. We can avoid the risk …

vault
What do you mean by storage encryption?

In my year-long research project, the F5 Labs’ 2018 Application Protection Report, I asked if security professionals used storage encryption for data and applications. About …

door
Who owns application security?

In July 2018, F5 released its first annual Application Protection Report. As part of the report, F5 commissioned Ponemon to survey of 3,135 IT security practitioners across …

Alkemist
New infosec products of the week​: August 17, 2018

Alkemist: Harden vulnerable embedded systems and devices RunSafe Security announced the availability of Alkemist, a proprietary self-service technology built to reduce …

F5 simplifies network functions virtualization for service providers

F5 Networks introduced a network functions virtualization (NFV) offering for services that are deployed, scaled, managed, and decommissioned as service needs evolve. F5’s new …

stop
Security’s bane: The false positive

Nothing makes security look worse than the false negative – when we miss an attack and damage is suffered. As security professionals, it’s something we all obsess a lot …

F5 Networks appoints Michel Combes to board of directors

F5 Networks announced the appointment of Michel Combes, CEO of Sprint, to its board of directors. Combes joins F5’s board as a leader with 30 years of experience in the …

F5 welcomes Mary Gardner as CISO

F5 Networks announced that Mary Gardner has joined the company’s leadership team as its chief information security officer (CISO). In this role, she is responsible for F5’s …

analyst
The ethical and legal dilemmas of threat researchers

Threat intelligence is mainstreaming into a de-facto everyday tool of cyber-defense. But all that intelligence must be collected, analyzed, and prepared by someone. Enter …

user
The eternal struggle: Security versus users

There’s an old joke that a job in security is a safe place to be grumpy. From what I’ve seen over my career, that is often true. Security people seem to cherish their …

users
Discover hidden cybersecurity talent to solve your hiring crisis

Not having access to technical talent is a common complaint in the cybersecurity world. Folks with security experience on their resumes are in such high demand, CISOs need to …

architecture
How digital transformation is reshaping the modern enterprise

F5 Networks announced the results of its 2018 State of Application Delivery report, which shows accelerating multi-cloud deployments are enabling organizations to select the …

Don't miss

Cybersecurity news