Hi [[ session.user.profile.firstName ]]

F5 Security

  • Date
  • Rating
  • Views
  • How to Build a Comprehensive Defense Against DDoS Attacks
    How to Build a Comprehensive Defense Against DDoS Attacks
    Nathan Mckay- Solutions Marketing Manager, F5 Networks David Remington- Security Solutions Architect, F5 Networks Recorded: Sep 10 2018 51 mins
    DDoS attacks continue to increase in frequency – and complexity. Your network, apps, and other supporting infrastructure make for a large DDoS attack surface, meaning defense must be comprehensive. A DDoS solution should address all types of attacks whether a volumetric attack aimed at your network bandwidth or a low-and-slow attack aimed at your app or infrastructure.

    F5 DDoS Hybrid Defender (DHD) is a unique solution that offers comprehensive DDoS protection against all attack types, turning a potential catastrophe into a minor annoyance.

    Join us for this webinar to learn about:
    •Ensure accurate DDoS attack detection utilizing attack signatures, behavioral analytics to identify deviations from normal traffic, and detection of server stress
    •Leverage real-time traffic decryption to protect your applications as well as your network and intelligently block the bad traffic without impacting the good traffic
    •Automatically signal to F5’s cloud-based scrubbing service, and seamlessly re-direct attack traffic to prevent even the largest volumetric attacks from saturating your bandwidth
  • Thingbot Apocalypse - How to prepare for IoT device attacks
    Thingbot Apocalypse - How to prepare for IoT device attacks
    Sara Boddy- Director, F5 Labs Recorded: Jul 27 2018 48 mins
    Our modern world depends on healthy, functioning, IoT devices; however, many of them are unsecure. Cyber attackers have compromised IoT devices for over a decade, turning them into Thingbots―botnets made from IoT devices.

    The hunt for IoT attacks has made a pivotal turn in the last two and a half years. F5 Labs has been tracking these attacks and the subsequent building of Thingbots from boutique attacks, into more sophisticated and powerful cyber weapons. Thingbots are now being sold as multi-vector bots-for-hire that allow cyber attackers to launch any attack of their choice―often used for automated web application attacks and credential stuffing.

    With the threat of IoT attacks increasing, as billions of new devices are deployed each year, the ability to detect threats, and clean and upgrade infected systems is still not a part of most IoT development processes.

    In this webinar we’ll explore:

    - How attacks have evolved from the methods they use to the attacks they launch from the resulting Thingbots
    - The threat actor networks and IPs behind these attacks, their geographical targets, and how that has changed over time
    - What you should do to protect your company
  • The Internet of "Very Bad" Things
    The Internet of "Very Bad" Things
    Sara Boddy- Director, F5 Labs and Thomas Norman- CPP/PSP, Ingram Recorded: Jun 8 2018 53 mins
    While attackers have been exploiting IoT devices in the consumer market for a while, they’re now increasingly targeting higher value business targets. IoT devices are typically not secure and they can be used to gain entry into your network where a devastating attack can then be carried out.

    Join top security researchers Thomas Norman, Ingram Micro, Sara Boddy and Justin Shattuck from F5 Labs, and Moderator Gregg Linde as they discuss the realities of IoT security and find out:

    • What IoT means to consumers and enterprises
    • How attackers use IoT to carry out attacks
    • Why current IoT Security approaches are making the problem worse
    • How you can protect your data and organization from IoT attacks
  • Leveraging innovative security and app delivery solutions from the F5-Microsoft
    Leveraging innovative security and app delivery solutions from the F5-Microsoft
    Jeff Stathatos- Cloud Solutions Architect, F5 Networks, Claus Wieser- Senior Partner Development Manager, Microsoft Recorded: Jun 6 2018 38 mins
    Hear experts from F5 and Microsoft talk about joint offerings that provide more secure application delivery, upgrade federated identity security, and maximize app security in the cloud.

    Join us to learn more about:

    • How you can fortify your identity security and improve the UX for Microsoft Active Directory and Office 365
    • How to enable faster, smarter, and safer app deployment by inserting a CI/CD toolchain into your application infrastructure
    • How to mitigate vulnerabilities and stop application threats throughout your journey to Azure using the F5 WAF for Azure
  • Why Advanced Threats Require Advanced Application Defense
    Why Advanced Threats Require Advanced Application Defense
    Brian McHenry- Senior Manager, Global Customer Solutions Engineering Byron McNaught- Product Marketing Manager Recorded: May 17 2018 46 mins
    Web application attacks are the #1 source of data breaches. A Web Application Firewall (WAF) provides critical security controls to protect web apps. However, not all WAF solutions are the same. While many can help an organization protect their apps from common and known threats, most are inadequate against the myriad of attacks across the evolving risk landscape.

    F5 announced Advanced WAF, a new category of app protection that introduces unique capabilities to the WAF market. Watch this webinar to learn how F5’s Advanced WAF can:

    • Provide strong, adaptable security for every app, whether on-premises or in the cloud
    • Defend web and mobile apps against malicious bots and exploits
    • Prevent account takeover and stop large scale credential theft and abuse
    • Protect apps from layer 7 denial of service attacks
  • Making Security Cloud-Friendly
    Making Security Cloud-Friendly
    Nathan McKay and Robert Haynes Recorded: Apr 19 2018 61 mins
    Security in the cloud vs. cloud security – whose job is it anyway? According to F5 Labs researchers, 86% of successful data breaches begin with compromises of the application layer services or user identities – placing responsibility for app security squarely in the hands of the app owners, developers, and enterprises deploying them. Application security can be difficult and daunting, but it doesn’t have to be.

    The cloud paradigm has made infrastructure easy for lots of us, and application security is poised to follow suit with advanced security tools now more affordable and accessible than ever via your favorite cloud du jour. We’ve reached a new inflection point where security tools once seen as costly and burdensome can now be seen as business enablers.
  • Imperva Part 3: The Rise of Bots: Top 5 Bot Driven Threats & How to Stop Them
    Imperva Part 3: The Rise of Bots: Top 5 Bot Driven Threats & How to Stop Them
    Brian McHenry, Senior Manager, Systems Engineering, F5; Brandon Dunlap, Moderator Recorded: Mar 29 2018 59 mins
    Bots are now teetering on the edge of being the majority of traffic on the internet. It’s not all bad news, as there are plenty of useful bots that make both our work and personal lives more productive. However, malicious bot and botnet creators have introduced more sophistication into their bots, making them harder to detect, and the resulting threats are becoming more common place. Join F5 and (ISC)2 on March 29, 2018 at 1:00PM Eastern as data gathered from internal threat research teams is presented that explains how bots are being created, the top application threats driven by bots, and how to detect and better protect to your business.
  • How to Combat the 7 Common Emergent Threats
    How to Combat the 7 Common Emergent Threats
    Keiron Shepherd, Senior Systems Engineer - Security, F5 Networks Recorded: Mar 21 2018 64 mins
    In today’s digital marketplace, your applications are the backbone of your business. However, cloud-based apps create a host of complex challenges and new risks. With automated tools and hackers for hire, threats are increasing and cybercrime has turned into a game for profit. The digital world has opened the door to unprecedented threats, putting your corporate data and reputation at risk.

    Join us for this webinar to learn about:
    • The 7 most common threats to your apps and data: Malicious bots, Credential stuffing, DDoS, Ransomware, Web fraud, Phishing, and Malware
    • How you can leverage threat intelligence to secure your apps and data
    • Where to spend your security budget to provide the strongest level of protection

    By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://f5.com/about-us/policies/privacy-policy). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • F5 Part 2: The Hunt for IoT and it’s Threat to Modern Life
    F5 Part 2: The Hunt for IoT and it’s Threat to Modern Life
    Sara Boddy, Director of F5 Labs Threat Research, F5; Brandon Dunlap, Brightfly (Moderator) Recorded: Mar 1 2018 59 mins
    Our modern world depends on healthy, functioning, IoT devices. Unfortunately many of them are terribly insecure. Cyber attackers know this and have been aggressively compromising IoT devices for years. For the past two years, F5 Labs has been tracking cyber attackers as they hunt, infect, and build “Thingbots” - botnets made from IoT devices. This hunt has developed sizable thingbots like the infamous Mirai, and many others that have the capability to launch globally destructive attacks. These attacks can significantly impact modern life because of IoT’s presence within power systems, transportation systems, airport monitors, emergency warning systems, and security cameras. Join F5 and (ISC)2 on March 1, 2018 at 1:00PM Eastern for the 2nd Part of our three part Security Briefings series where we’ll explore the threat actors behind these attacks, the geographical targets of their attacks, how they are evolving their attack methods, and the types of devices impacted. We’ll include tips on how to start protecting yourself personally, and what you should be doing to protect your businesses.
  • Plan the Work & Work the Plan – Continuing the Move to the Cloud
    Plan the Work & Work the Plan – Continuing the Move to the Cloud
    Tom Thomas, Director of Enterprise Architecture, F5; Ryan Goode, Sr Mgr, Tech Ops, (ISC)2; Brandon Dunlap, Moderator Recorded: Feb 15 2018 58 mins
    Chances are, your organization has made a move to the cloud. In fact, most enterprises run approx. 45% of their applications and infrastructure in the cloud with that number sure to increase in the next 12 months. But as you relocate more into the cloud, what’s your strategy? What are you moving? What benefit are you seeking? Different businesses have different goals and objectives. Join F5 and (ISC)2 on February 15, 2018 at 1:00PM Eastern for a discussion on the continuing evolution of cloud migration and how organizations should prepare, strategize and execute their cloud journey while addressing operational needs, security concerns and the options that cloud-based services can bring.

Embed in website or blog