F5 博客

筛选条件:
解决方案
  • Application Security
  • Automation & Orchestration
  • Cloud
  • Traffic Management
  • Service Provider
产品
  • Security
  • BIG-IP
  • Automation & Orchestration
  • Platforms
年份

The Courage to Ask, “What If?”

F5 announces our 2022 Tech for Good grant recipients—25 NGOs working to build more vibrant communities around the globe.

Do You Really Know Who’s Bidding on Your NFTs?

NFT marketplaces, and organizations considering other Web3 business models, need to understand and address the fast-changing security requirements of doing business in the metaverse. To be successful, these new digital exchanges will need to offer dynamic security defenses against bot and other cyberattacks to safeguard their NFT investments, marketplace reputation, and the activities and experiences of customers.

Preventing Healthcare Fraud and Protecting Patient Data

Learn how to prevent fraudulent healthcare claims and payouts by mitigating common identity theft and account takeover attacks with these tips and F5 solutions.

State of Application Strategy 2022: Edge Workloads Expanding to Apps and Data

Many organizations are planning to deploy data and app distribution workloads at the edge, but to do that will require an edge application platform capable of supporting those workloads. That platform will need to meet the needs of new application patterns and focus on both the ops experience and flow of data and control.

F5 Labs Shows Evolving Threat Landscape in Latest Application Protection Report

F5 Labs recently published its annual Application Protection Report, synthesizing data from several sources to understand the evolution of the threat landscape over time, the relationship between organizations’ characteristics and the attack techniques they face, and—most importantly—what security practitioners can do to mitigate the risks.

The Third Wave of the Internet is Driving the Need for a New Edge Platform

Edge computing is under pressure to simultaneously evolve with each wave of the internet. As we ride the third wave, this next evolution demands the creation of a platform to support new capabilities within the edge ecosystem. A platform that cannot simply be bolted together, but requires a new approach with design considerations at the architectural level.

Meet the Minds behind F5’s Advanced Threat Research Center of Excellence (ATRCoE)

Not even the stealthiest threats can hide from F5's Advanced Threat Research Center of Excellence. The team conducts rigorous research to unravel the details of today's cybersecurity threats and then shares their insights to help shut them down.

Catalysts of F5 NGINX for Azure

Christine Puccio looks at market and industry trends that point to the value F5 creates in broadening the ways customers can leverage popular commercial marketplaces to procure, consume, and expand the use of solutions from the company’s growing software and SaaS portfolio.

7 (More) Cybersecurity Myths that are Harming Your Business

It's been two years since Dan Woods flagged 7 notable cybersecurity myths plaguing organizations. Since then, the world has been shocked economically, politically, and technologically, bringing into focus an additional 7 myths that continue to trip up IT teams.

平衡风险与创新:安全使命无法达成?

如今,安全扮演着多重角色:数字化转型的推动者、客户信任的监管者以及组织声誉的守卫者。作为企业取得成功的基本要素,将公司对于安全的认识作为一种思维方式而不仅仅是一项功能,意味着要开展需投入时间与精力的文化变革。