Protecting apps and APIs with F5

Application service environments have become more complex as organizations improve the digital services they provide to users and pursue a broader range of infrastructure models to improve performance and reduce costs.

Cybersecurity mitigations no organisation can afford to ignore

Code signing is another underused approach, in light of architectural trends that pull code from disparate sources at runtime. In particular, sub-resource integrity (SRI) headers can ensure that external scripts haven’t been modified when they are called at runtime. As applications increasingly rely on external scripts to pull in new features, SRI is a powerful tool to shut down vectors.

Cybersecurity controls to stop ransomware

F5 Labs’ 2021 Application Protection report shows that ransomware was a factor in about 30% percent of U.S. breaches in 2020. This trend is also playing out to varying degrees globally. When we look at the breach analyses, some of the most important controls were user account management, network segmentation, and data backup. The challenge is how to best implement them.

Web application exploits play the villain for cybersecurity incidents

Cyentia Institute’s analysis, 56% of cybersecurity issues in last five years traced back to a web application problem. For six of previous eight years, web application attacks have been the common type of data leak,

DoS and password login attacks on the rise between 2018 and 2020

Most DoS attacks are network volumetric floods (commonly known as TCP SYN or UDP floods). F5 SIRT also received reports of “Slow POST/Slowloris” attacks, designed to initiate and keep as many of a victim’s connections open as possible. 19% of reported DoS incidents involved attacks on DNS.