Technical Articles
F5 SMEs share good practice.
Showing results for 
Search instead for 
Did you mean: 
Custom Alert Banner
Legacy Employee
Legacy Employee

0151T000003d6pXQAQ.jpgHave you ever wondered how some of the most prevalent web application attacks are actually executed in real life?  Join us on Thursday, April 28 @ 10:00 Pacific as F5's security expert David Holmes will walk through the methodology used by some of the most successful attacks in history.  We will discuss recent and relavent examples of network attacks like the Kate Upton iCloud hack, some of the Anonymous and LulzSec attacks using the TOR network, and even social attacks on CEOs.  

You'll learn about how the attacks take place, but you'll also learn how to stop them!  David will spend about 40 minutes discussing the attacks and mitigation techniques, and then we will have about 20 minutes for answering questions.


Here's the link to sign up:


Feel free to use the comment section below for questions.  We will have time at the end of the presentation to address questions that you submit.

Version history
Last update:
‎25-Apr-2016 10:00
Updated by: