Securing SSL Keys on your BIG-IP
Losing your keys is a real problem
While losing your car keys is indeed a pain, I mean losing your Web Server Keys. Lost keys can expose your website to a Man in The Middle (MiTM) Attack. While in...
Published Jan 05, 2021
Version 1.0Scheff
Employee
š Senior Solutions Architect | API Security Specialist | AI & Post-Quantum Strategist
I help organizations make sense of complex security challenges ā from securing modern API infrastructures to building zero trust architectures that scale. With deep expertise in F5 technologies, OAuth, and identity standards like FDX, I bridge the gap between technical execution and strategic innovation.
Currently focused on:
Leading AI security initiatives, including securing Large Language Models (LLMs) from emerging threats
Evangelizing post-quantum cryptography (PQC) in real-world deployments
Developing gamified Capture-the-Flag challenges to train engineers in offensive/defensive API tactics
Advising on infrastructure transformation, security automation, and cloud-native rollouts
Outside of work, I stay curious ā whether it's road-tripping across North America with a trailer and a plan, writing an upcoming book on AI threat mitigation, or creating unforgettable RPG characters who cast spells with swords.
Letās talk security, strategy, or why your TLS handshake failed at 3 a.m.Scheff
Employee
š Senior Solutions Architect | API Security Specialist | AI & Post-Quantum Strategist
I help organizations make sense of complex security challenges ā from securing modern API infrastructures to building zero trust architectures that scale. With deep expertise in F5 technologies, OAuth, and identity standards like FDX, I bridge the gap between technical execution and strategic innovation.
Currently focused on:
Leading AI security initiatives, including securing Large Language Models (LLMs) from emerging threats
Evangelizing post-quantum cryptography (PQC) in real-world deployments
Developing gamified Capture-the-Flag challenges to train engineers in offensive/defensive API tactics
Advising on infrastructure transformation, security automation, and cloud-native rollouts
Outside of work, I stay curious ā whether it's road-tripping across North America with a trailer and a plan, writing an upcoming book on AI threat mitigation, or creating unforgettable RPG characters who cast spells with swords.
Letās talk security, strategy, or why your TLS handshake failed at 3 a.m.Jan 06, 2021
I know, but when the cluster master key changes your BIG-IP is unable to decrypt the private keys.