- Attackers place cryptojacking apps in the Microsoft App Store
- Data breaches exposed 5 billion records in 2018.
- Users are still terrible with passwords, but popularity of security apps suggests they want to get better
- Business email compromise attacks surge as ransomware trails off
- Dating site Coffee MeetsBagel warns Aussie users of data breach on Valentines Day
Solve the application visibility challenge

This report demonstrates how enterprises can leverage their existing footprint of market-leading application delivery controllers for both instrumentation and policy enforcement.
· The ability to observe, diagnose, and subsequently improve the performance of business-critical applications is essential
· The challenge of establishing an effective application visibility and control function is only growing as tech trends become more widespread
· A next-generation application visibility solution can efficiently and economically deliver unprecedented insight into virtual desktops, mobile and cloud services
-
How do you make sure that you gain everything that has been promised to you? To secure the benefits of the cloud, you need to evolve your organisation and the processes by which you manage your infrastructure and applications. Download whitepaper »
-
According to research from the F5 Labs threat intelligence team, 80% of page loads on millions of sites sampled are encrypted. Transport Layer Security (TLS) adoption has become the norm for organizations of all sizes and in all industries due to several driving factors: the EU General Data Protection Regulation (GDPR), Google search results ranking preferences, browser warnings for HTTP (cleartext) sites, and the growing importance of privacy, to name just a few. While this evolution improves security for web traffic, it comes at a price—increased workload demand and the potential hazards of malware cloaked in encrypted traffic. Find out how to defend against what you cant see. Download whitepaper »
-
According to research by F5 Labs, more than 81% of all web page loads are now encrypted with SSL/TLS, which means that we are moving very quickly toward an Internet where nearly every piece of data in transit will be encrypted. However, the rise of SSL/TLS isn’t all good news. Attackers are increasingly hiding insidious attacks within encrypted traffic—which means that the security protocol itself has become a threat vector. Regaining visibility into that encrypted traffic is one of the most important steps you can take to protect your apps, your data, and your business Find out how today. Download whitepaper »
- Microsoft shoves some Windows 10 testers into next year with early look at 2020 feature upgrade
- Wireless charging from A to Z: What you need to know
- AI fake text generator hobbled over fear of ‘malicious applications’
- LandMark White data posted on darkweb forum
- Cyber espionage research group Citizen Lab emboldened by ‘entrapment attempt’
- Microsoft shoves some Windows 10 testers into next year with early look at 2020 feature upgrade
- We’re going to see the emergence of RegTech as an industry: Sri Shivananda
- Java thread sanitizer project proposed once again
- Wireless charging from A to Z: What you need to know
- 5G is "not the atom bomb" says Huawei rotating CEO Eric Xu