Home Security

Security

IT security is a set of strategies for cybersecurity that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information. With applications, data and identities moving to the cloud, more and more sensitive information is exposed directly over the internet; unprotected by the traditional security stack. Cloud security can help secure the usage of public cloud and SaaS, but require a different mindset and implementation of cloud-aware security tools and processes.

F5 NGINX Ingress Controller and App Protect in a cloud native container world

F5 NGINX Ingress Controller and App Protect in a cloud-native, container world

In this post in our series of F5’s application services, we’re looking at how F5 and specifically NGINX help application development and DevOps teams, with features like the NGINX Ingress Controller...
F5 whitepaper How To Protect Against The OWASP Top 10 And Beyond

How to protect against the OWASP top 10 and beyond

Application security is a top priority in the IT security landscape for every organisation. Applications are the pathway to your data, protecting your business means it’s critical that you understand the...
F5 From Code to Customer commitment to application delivery and security

‘From Code to Customer’, F5’s commitment to application delivery and security

F5’s motto is From Code to Customer. In this post, we’ll look at how F5’s product portfolio implements that vision with its products. This is post 1 of 4, in the Amazic...
Ten cloud migration barriers and how to tackle them

10 cloud migration barriers and how to tackle them

Winning teams at large enterprises adopt cloud technology at a rapid pace. This brings changes to 3 well-known aspects: people, process & technology. Despite good efforts, there are also departments that...
Let your Pods do the talking

Let your Pods do the talking

In this article, we'll let your Pods to the talking. Almost all applications deployed to Kubernetes need to access cloud-native resources sooner or later. The application might need to talk to an...
Is SOAR the key enabler of DevSecOps

Is SOAR the key enabler of DevSecOps?

It is hard to soar with the eagles when you work with turkeys was a saying we used to use in the army. In the realm of security, this has never...
Control plane

What is a Service Mesh and why do you need it?

Probably not a surprise for anyone in the DevOps world: monoliths are becoming microservices. However, new challenges arise. How to split them up based on business domains? When to separate the...
Risk Management in a DevOps world

Risk Management in a DevOps world

Every great new feature of the application you push to production provides an opportunity to increase the revenue of your organization. On the other hand, every commit and with it, every...
Has the Lastline been crossed, VMware add another company to the fold

Has the Lastline been crossed, VMware add another company to the fold

VMware must have found a pot of gold under the end of the rainbow recently, they have been splashing the cash again, their latest acquisition is yet another addition to their...
Embedding Continuous Security into the delivery pipeline

Embedding Continuous Security into the delivery pipeline

Many enterprises have successfully shifted to the cloud because they embraced the adoption of DevOps. Running their IT services in the cloud made it possible to implement DevOps processes in a...