F5 Networks
New infosec products of the week: August 17, 2018
Alkemist: Harden vulnerable embedded systems and devices RunSafe Security announced the availability of Alkemist, a proprietary self-service technology built to reduce …
F5 simplifies network functions virtualization for service providers
F5 Networks introduced a network functions virtualization (NFV) offering for services that are deployed, scaled, managed, and decommissioned as service needs evolve. F5’s new …
Security’s bane: The false positive
Nothing makes security look worse than the false negative – when we miss an attack and damage is suffered. As security professionals, it’s something we all obsess a lot …
F5 Networks appoints Michel Combes to board of directors
F5 Networks announced the appointment of Michel Combes, CEO of Sprint, to its board of directors. Combes joins F5’s board as a leader with 30 years of experience in the …
F5 welcomes Mary Gardner as CISO
F5 Networks announced that Mary Gardner has joined the company’s leadership team as its chief information security officer (CISO). In this role, she is responsible for F5’s …
The ethical and legal dilemmas of threat researchers
Threat intelligence is mainstreaming into a de-facto everyday tool of cyber-defense. But all that intelligence must be collected, analyzed, and prepared by someone. Enter …
The eternal struggle: Security versus users
There’s an old joke that a job in security is a safe place to be grumpy. From what I’ve seen over my career, that is often true. Security people seem to cherish their …
Discover hidden cybersecurity talent to solve your hiring crisis
Not having access to technical talent is a common complaint in the cybersecurity world. Folks with security experience on their resumes are in such high demand, CISOs need to …
How digital transformation is reshaping the modern enterprise
F5 Networks announced the results of its 2018 State of Application Delivery report, which shows accelerating multi-cloud deployments are enabling organizations to select the …
Reacting to a big breach
As I write this, the industry is still wagging its fingers at the latest big breach. But in the time that it takes to get this published, there could easily be another …
PyCryptoMiner ropes Linux machines into Monero-mining botnet
A Linux-based botnet that has been flying under the radar has earned its master at least 158 Monero (currently valued around $63,000). The malware The botnet is based on a …
To protect your network, you must first know your network
A sobering statistic regarding commonly used security controls was highlighted in a recent report. “Software and hardware inventory and valuation” was the least …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments