Asia's Source for Enterprise Network Knowledge

Monday, May 27th, 2019

application security

Credential stuffing

Access and identity

In the first six months of 2017, there were 2,227 breaches reported, exposing over 6 billion records and putting untold numbers of accounts at risk.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Application Security: A Step Towards GDPR Compliance

While organizations have many security-related reasons for protecting their apps and the personal data of their users, they have another very compelling financial reason: the European Union (EU) General Data Protection Regulation (GDPR).

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Multi-cloud security: Web app, API protection against phishing, fraud

A combination of app protection, network security, access controls, threat intelligence, and endpoint inspection shuts down phishing and fraudulent activities across heterogenous environments before they can exact a damaging toll on business.

The New Way to Work: Per-App

 It’s time to optimize the value of your application services to get ahead of the digital transformation curve.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

How innovative organizations balance app security, performance

In their quest to secure applications, most IT leaders know how important application performance is to the continued success of a digital business.

Security-performance balance in combating encrypted threats

A key discovery from F5 Labs’ study of a decade's worth of breach cases is that companies usually only know a small fraction of what went on in the attacks that lead to a breach.

Practical cloud considerations: security

Compute in the cloud may be cheap but it isn't free.

Why identity is the new perimeter for borderless businesses

 Since users no longer distinguish between remote access and on-premises access and they expect to connect from anywhere and on any device, network and security teams must ensure staff remains productive without putting the business or its data at risk. 

The Evolving Risk Landscape: Preparing for Emerging Threats

This white paper provides an overview of the application threat landscape to help organizations understand and mitigate emergent threats better.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Lessons learned from a decade of data breaches

F5 Labs researched 433 breach cases spanning 12 years, 37 industries, and 27 countries to discover patterns in the initial attacks that lead to the breach.