F5’s 2024 State of Application Strategy Report: API Security reveals gaps in API protection and urgent need for comprehensive security measures.
F5 launches NGINX One, simplifies app security and delivery for dev, ops, and platform teams
Unifies NGINX offerings via a SaaS-based console for easy access to tools across all applicable teams.
F5 to highlight new API security, multicloud and AI credentials at GITEX Global 2024
F5’s API security, multicloud networking and AI credentials are set to take centre stage at GITEX Global 2024.
F5 welcomes Lyra Schramm as Chief People Officer and Kunal Anand as Chief Technology Officer
F5 welcomes Lyra Schramm as Chief People Officer and Kunal Anand as Chief Technology Officer.
F5 adds automated penetration testing to strengthen multicloud application security capabilities
Technology acquired through Heyhack strengthens F5’s multicloud application security portfolio, enabling customers to automate vulnerability discovery.
Six tips to protect your organisation from holiday scams
Attackers and bad actors will go to any lengths to get your data and hard-earned cash using techniques including phishing emails and mobile texts containing links to fake websites designed to look like legitimate brands.
StarLink and F5 to collaborate at Blackhat MEA 2023
Event set to highlight flexible solutions that can secure, deliver, and optimise every app and API – wherever they reside.
F5 strengthens relationship with Google Cloud in Qatar
45 F5 solutions now available via Google Cloud Marketplace, powered by new Doha-based data centre.
AI is here: How should CISOs respond?
To stay competitive, it’s essential for organisations to adopt AI technology while safeguarding against potential risks. By taking these steps now, companies can ensure they’re able to reap the full benefits of AI while minimising exposure.
Does MFA solve the threat of account takeover?
Because MFA is a significant improvement over password-only authentication, it is here to stay, so cybersecurity practitioners must address its vulnerabilities.