NIST and the UK's NCSC currently recommend not enforcing frequent password changes, and instead to use longer passphrases over shorter passwords. We take a look at the math to see what really makes sense, and arrive at some straightforward suggestions.
Despite how they sound, Spring4Shell and the related vulnerabilities in the Spring Framework aren’t exactly like Log4Shell. Learn how they work and what you can do.
Practical, relatively easy to perform actions that companies of different security postures can take immediately, based on the overall maturity of their existing security program. Because saying "just patch" isn't helpful.
Access control is an essential aspect of information security that enables organizations to protect their most critical resources by controlling who has access to them.
Managing online privacy is a balancing act for both users and security professionals. We can do better than simply following privacy regulations such as the GDPR and CPRA.
We asked a diverse group of F5 security experts about cybersecurity in 2022. Here’s what they said. We look at cyber-war, cyber-crime, the cloud, the supply chain, encryption keys, and new ransomware targets.
A deconstruction of FluBot 5.0’s new communication protocol and other capabilities FluBot uses to hide, making it difficult for researchers and security solutions to detect.
It can be easy to give in to frustration and pessimism during catastrophic events. But there are signs that not all is lost, even in the world of software dependencies.
As Christmas quickly approaches, seasonal phishing trends once again show that attackers are taking advantage of increased online shopping. Fraudsters doubled their efforts in November attacking ecommerce giants such as Amazon. The real attacker focus, however, was cryptocurrency with fraudulent sites...
The log4j security vulnerability is one of the most widespread cybersecurity vulnerabilities in recent years. Here's a non-technical explanation of it.