Hi [[ session.user.profile.firstName ]]

F5 Security

  • Date
  • Rating
  • Views
  • Making Security Cloud-Friendly
    Making Security Cloud-Friendly Nathan McKay and Robert Haynes Recorded: Apr 19 2018 61 mins
    Security in the cloud vs. cloud security – whose job is it anyway? According to F5 Labs researchers, 86% of successful data breaches begin with compromises of the application layer services or user identities – placing responsibility for app security squarely in the hands of the app owners, developers, and enterprises deploying them. Application security can be difficult and daunting, but it doesn’t have to be.

    The cloud paradigm has made infrastructure easy for lots of us, and application security is poised to follow suit with advanced security tools now more affordable and accessible than ever via your favorite cloud du jour. We’ve reached a new inflection point where security tools once seen as costly and burdensome can now be seen as business enablers.
  • Briefings Part 3: The Rise of Bots: Top 5 Bot Driven Threats & How to Stop Them
    Briefings Part 3: The Rise of Bots: Top 5 Bot Driven Threats & How to Stop Them Brian McHenry, Senior Manager, Systems Engineering, F5; Brandon Dunlap, Moderator Recorded: Mar 29 2018 59 mins
    Bots are now teetering on the edge of being the majority of traffic on the internet. It’s not all bad news, as there are plenty of useful bots that make both our work and personal lives more productive. However, malicious bot and botnet creators have introduced more sophistication into their bots, making them harder to detect, and the resulting threats are becoming more common place. Join F5 and (ISC)2 on March 29, 2018 at 1:00PM Eastern as data gathered from internal threat research teams is presented that explains how bots are being created, the top application threats driven by bots, and how to detect and better protect to your business.
  • How to Combat the 7 Common Emergent Threats
    How to Combat the 7 Common Emergent Threats Keiron Shepherd, Senior Systems Engineer - Security, F5 Networks Recorded: Mar 21 2018 64 mins
    In today’s digital marketplace, your applications are the backbone of your business. However, cloud-based apps create a host of complex challenges and new risks. With automated tools and hackers for hire, threats are increasing and cybercrime has turned into a game for profit. The digital world has opened the door to unprecedented threats, putting your corporate data and reputation at risk.

    Join us for this webinar to learn about:
    • The 7 most common threats to your apps and data: Malicious bots, Credential stuffing, DDoS, Ransomware, Web fraud, Phishing, and Malware
    • How you can leverage threat intelligence to secure your apps and data
    • Where to spend your security budget to provide the strongest level of protection

    By watching this webinar, you consent to the transfer of your personal information outside your country of residence, where standards of data protection may be different. You understand that the information you provide will be treated in accordance with the F5 Privacy Policy (https://f5.com/about-us/policies/privacy-policy).
  • Briefings Part 2: The Hunt for IoT and it’s Threat to Modern Life
    Briefings Part 2: The Hunt for IoT and it’s Threat to Modern Life Sara Boddy, Director of F5 Labs Threat Research, F5; Brandon Dunlap, Brightfly (Moderator) Recorded: Mar 1 2018 59 mins
    Our modern world depends on healthy, functioning, IoT devices. Unfortunately many of them are terribly insecure. Cyber attackers know this and have been aggressively compromising IoT devices for years. For the past two years, F5 Labs has been tracking cyber attackers as they hunt, infect, and build “Thingbots” - botnets made from IoT devices. This hunt has developed sizable thingbots like the infamous Mirai, and many others that have the capability to launch globally destructive attacks. These attacks can significantly impact modern life because of IoT’s presence within power systems, transportation systems, airport monitors, emergency warning systems, and security cameras. Join F5 and (ISC)2 on March 1, 2018 at 1:00PM Eastern for the 2nd Part of our three part Security Briefings series where we’ll explore the threat actors behind these attacks, the geographical targets of their attacks, how they are evolving their attack methods, and the types of devices impacted. We’ll include tips on how to start protecting yourself personally, and what you should be doing to protect your businesses.
  • Plan the Work & Work the Plan – Continuing the Move to the Cloud
    Plan the Work & Work the Plan – Continuing the Move to the Cloud Tom Thomas, Director of Enterprise Architecture, F5; Ryan Goode, Sr Mgr, Tech Ops, (ISC)2; Brandon Dunlap, Moderator Recorded: Feb 15 2018 58 mins
    Chances are, your organization has made a move to the cloud. In fact, most enterprises run approx. 45% of their applications and infrastructure in the cloud with that number sure to increase in the next 12 months. But as you relocate more into the cloud, what’s your strategy? What are you moving? What benefit are you seeking? Different businesses have different goals and objectives. Join F5 and (ISC)2 on February 15, 2018 at 1:00PM Eastern for a discussion on the continuing evolution of cloud migration and how organizations should prepare, strategize and execute their cloud journey while addressing operational needs, security concerns and the options that cloud-based services can bring.
  • Don't Get Stung! Examining the OWASP Top 10 & Getting the Most from Advanced WAF
    Don't Get Stung! Examining the OWASP Top 10 & Getting the Most from Advanced WAF Nathan McKay, Solutions Marketing Manager, F5; Brandon Dunlap (Moderator) Recorded: Feb 1 2018 59 mins
    Web application security is complex, difficult, and costly. These issues are well known, but remain prevalent out in the real world. Most development teams do not have the time or resources to sufficiently protect against the myriad of attacks that are relevant to each vector, while the level of expertise required to address these issues are difficult to come by even if your project has the time and budget for it. The good news is that advanced WAF technology is more accessible and affordable than ever before. With the right tools, comprehensive WAF coverage can not only reduce your exposures and give you better control over your applications but also help optimize your resources and reduce overall operating costs. Join F5 and (ISC)2 for Part 1 of a 3 part Security Briefings Series on February 1, 2018 at 1PM Eastern where we’ll discuss the OWASP Top 10, defenses for everything it addresses and how to use WAF to optimize and filter unwanted traffic to cut costs in the cloud.
  • Okta + F5: Enabling the Pitney Bowes Digital Transformation with Cloud IAM
    Okta + F5: Enabling the Pitney Bowes Digital Transformation with Cloud IAM Mark Campbell, Daniel Lu, Henry Rogando Recorded: Jan 23 2018 53 mins
    Cloud-delivered services are the foundation of the enterprise digital transformation. While the business benefits are compelling, balancing security with user experience can still impose challenging obstacles to innovation. Enterprises modernizing to the cloud must find solutions that complement and extend existing on-prem investments as they transition to “cloud first” architectures.

    Join Pitney Bowes, Okta, and F5 as we discuss how Pitney Bowes implemented Identity Management and Access Controls to help deliver a secure digitally connected commerce platform for its customers and business partners. With Okta and F5, Pitney Bowes extended their IT infrastructure to securely manage customer access to applications both in the cloud and behind the firewall.
  • Breaking Down the TLS Handshake
    Breaking Down the TLS Handshake John Wagnon Recorded: Jan 2 2018 13 mins
    John Wagnon walks through the process of the TLS handshake between client and server (BIG-IP).
  • Credential Stuffing
    Credential Stuffing John Wagnon Recorded: Jan 2 2018 9 mins
    The essence of the Credential Stuffing problem centers around the fact that lots and lots of user credentials have been stolen from many different places. An attacker will take stolen credentials from one place and try to "stuff" them into another in order to gain access. The problem (other than the fact that credentials were stolen) is that many people use the same username and password for multiple web applications. This video discusses the issue of credential stuffing and offers solutions to avoid this problem.
  • SSL Visibility: The Ultimate Passive Inspection Architecture
    SSL Visibility: The Ultimate Passive Inspection Architecture David Holmes Recorded: Jan 2 2018 11 mins
    As the march toward a forward secrecy world continues, what options do you have to inspect and act as an intermediary? Join David Holmes as he presents options to maintain visibility in the SSL service chain.

Embed in website or blog