F5 Networks

Displaying 1 - 10 of 158 results

  • The Hunt for IoT - The Rise of Thingbots

    White Papers // Jan 2018 // provided by F5 Networks

    The Internet of Things (IoT) and, specifically, the hunt for exploitable IoT devices by attackers, has been a primary area of research for F5 Labs for over a year now—and with good reason. IoT devices are becoming the “cyberweapon delivery system of choice” by today’s botnet-building attackers. And, why not?...

    Download Now
  • How Quantum Computing Will Change Browser Encryption

    White Papers // Jan 2018 // provided by F5 Networks

    The NSA’s Information Assurance Directorate left many people scratching their heads in the winter of 2015. The directive instructed those that follow its guidelines to postpone moving from RSA cryptography to elliptic curve cryptography (ECC) if they hadn’t already done so. For those partners and vendors that have...

    Download Now
  • The Evolving Risk Landscape: Preparing for Emergent Threats

    White Papers // Jan 2018 // provided by F5 Networks

    In today’s digital marketplace, your applications are your business. And while apps have increased productivity and the speed of innovation, they have also opened the door to unprecedented threats, putting corporate data and reputations at risk. By carefully considering current and emerging threats, utilizing and sharing threat intelligence, and aligning...

    Download Now
  • Global CISO Report

    White Papers // Jan 2018 // provided by F5 Networks

    What is a CISO, and what do they do? As the leader of cyber defense for an organization, the Chief Information Security Officer is rapidly becoming indispensable for an organization’s survival. Hacks and malware infections were once uncommon occurrences that were isolated to just office automation IT processes. ...

    Download Now
  • Preparing for the new OWASP Top 10

    White Papers // Jan 2018 // provided by F5 Networks

    There’s a reason why web application firewalls have been getting so much attention lately. It’s the same reason we keep hearing about major security and data breaches left, right, and center. Web application security is difficult—very difficult. Download now to learn more!

    Download Now
  • How Quantum Computing Will Change Browser Encryption

    White Papers // Nov 2017 // provided by F5 Networks

    This report highlights the distinction between quantum computing and quantum encryption and identifies the current amount of quantum computing exposure and how it will affect TLS.

    Download Now
  • The Hunt for IoT - The Rise of Thingbots

    White Papers // Nov 2017 // provided by F5 Networks

    F5 Labs has been tracking the hunt for IoT devices, the associated botnets being built from this activity, and the attacks they launch for the past year and a half. Our third report in the IoT Hunt series focuses on the development of what we now call “thingbots,” botnets built...

    Download Now
  • The Evolving Risk Landscape: Preparing for Emergent Threats

    White Papers // Nov 2017 // provided by F5 Networks

    In today’s digital marketplace, your applications are your business. And while apps have increased productivity and the speed of innovation, they have also opened the door to unprecedented threats, putting corporate data and reputations at risk. By carefully considering current and emerging threats, utilizing and sharing threat intelligence, and aligning...

    Download Now
  • Global CISO Report

    White Papers // Nov 2017 // provided by F5 Networks

    The role of the CISO is growing in importance, as is the need to have an enterprise-wise IT security strategy that supports the company's missions and goals. This research on the evolution and influence of the CISO is based on interviews with senior level IT professionals at 184 companies in...

    Download Now
  • F5 Networks - Securing the New Perimeter

    White Papers // Feb 2017 // provided by F5 Networks

    Applications today are everywhere, crossing boundaries between personal and professional, mobile and desktop, the data centre and the cloud. This is causing the traditional network perimeter to quickly dissolve as organizations’ infrastructures decentralize. As such, business data now 'lives' everywhere: Disparate and mobile user bases with...

    Download Now