2014
6 TopicsBlog Roll 2014
It’s that time of year when we gift and re-gift, just like this text from last year. And the perfect opportunity to re-post, re-purpose and re-use all my 2014 blog entries. If you missed any of the 96 attempts including 57 videos, here they are wrapped in one simple entry. I read somewhere that lists in blogs are good. I broke it out by month to see what was happening at the time and let's be honest, pure self promotion. Thanks for reading and watching throughout 2014. Have a Safe and Happy New Year. January OK 2014, Now What Bricks (Thru the Window) and Mortar (Rounds) The Icebox Cometh Playground 2.0 February Mobile Malware Milestone VMware PEX 2014: Find F5 VMware PEX 2014: F5 VMware Technology Alliance – Horizon View (feat Strobel) VMware PEX 2014: Optimized Horizon View Technical Whiteboard (feat Pindell) VMware PEX 2014: NSX Integration Demo (Cano solo) VMware PEX 2014: That’s a Wrap VMware PEX 2014: The Video Outtakes A 'Horizon' View from Above RSA 2014: Find F5 RSA 2014: Anti-Fraud Solution (feat DiMinico) RSA 2014: Secure Web Gateway (feat Moses) RSA 2014: DDoS Protection (feat Bocchino) RSA 2014: High Performance IPS (feat Blair) RSA 2014 Customer Spotlight: CARFAX RSA 2014: API Integration (feat Marshall) RSA 2014: Layering Federated Identity with SWG (feat Koyfman) RSA 2014: Jeremiah Grossman Interview RSA 2014: That’s a Wrap! RSA 2014: The Video Outtakes March So Where Do We Go From Here? The Applications of Our Lives Infrastructure as a Journey Malware costs $491 Billion in Perspective April Interop 2014: Find F5 Pop Up Edition Interop 2014: F5 in the NOC (feat Bocchino & Wojcik) Interop 2014: F5 Synthesis Whiteboard (feat Wagner) Interop 2014: F5 Interop NOC Stats Interop 2014: That’s a Wrap Interop 2014: The Blooper Reel The DNS of Things The Weekend of Discontent A Decade of Breaches May The Reach of a Breach Uncle DDoS'd, Talking TVs and a Hug Moving Target Welcome to the The Phygital World June A Living Architecture CloudExpo 2014: Future of the Cloud My Ten Years at F5 Velocity 2014 - Find F5 Velocity 2014 - Acceleration Reference Architecture (feat Haynes) Velocity 2014 – LineRate Storefront (feat Rafii) Velocity 2014 – HTTP 2.0 Gateway (feat Parzych) Velocity 2014 – TMOS & LineRate: A Tale of Two Proxies (feat Giacomoni) Velocity 2014 – BIG-IP Image Optimization (feat Parzych) Velocity 2014 – That’s a Wrap! July Will the Cloud Soak Your Fireworks? Apps Driving Attention Fear and Loathing ID Theft The Cloud is Still a Datacenter Somewhere Internet of Things OWASP Top 10 August Highly Available Hybrid The Internet of Sports Is IoT Hype For Real? VMworld 2014 – Find F5 VMworld 2014 – Global Applications with vCloud Air (feat Church) VMworld 2014 – Security Considerations for the SDDC (feat Frelich) VMworld 2014 – The F5 Reference Architecture for VMware NSX (feat Pearce) VMworld 2014 Partner Spotlight – BIG-IP & AirWatch Integration (feat AirWatch’s Berenato) VMworld 2014 – F5 & VMware Alliance (feat Rowland) VMworld 2014 – From VDI to EUC: The End User Computing Timeline (feat Pindell) VMworld 2014 – F5 Management Plug-in for vCenter Orchestrator (feat Munson) VMworld 2014 - Best Partner Solution in the Cloud Automation Category Award VMworld 2014 – That’s a Wrap! September The Breach of Things Internet of Food Oh, Is That The Internet You're Wearing? I Think, Therefore I am Connected Oracle OpenWorld 2014: Find F5 Oracle OpenWorld 2014: F5 & Oracle Integration (feat Gauthier) Oracle OpenWorld 2014: Delivering Oracle Apps from the Cloud (feat George) Oracle OpenWorld 2014: Partner Architectural Solutions (feat Wallace) Oracle OpenWorld 2014: Identity & Access Management in the Cloud (feat Deang) October Oracle OpenWorld 2014: That’s a Wrap! Play Ball! My Sensored Family The Internet of...(Drum Roll Please)...Band-Aids?!? Available Applications Anywhere November The Digital Dress Code CloudExpo 2014: The DNS of Things AWS re:Invent 2014: Find F5 AWS re:Invent 2014: BIG-IP Test Drive on AWS (feat Stathatos) AWS re:Invent 2014: LineRate to the Rescue (feat Rafii) AWS re:Invent 2014: F5 Licensing for the Cloud (feat Rublowsky) AWS re:Invent 2014: That’s a Wrap! Collaborate in the Cloud December Gartner Data Center 2014 – Find F5 GartnerDC 2014 – Hybrid is the New Normal (feat. Haynes) GartnerDC 2014 – Application Availability Between Hybrid Data Centers GartnerDC 2014 – That’s a Wrap! Pearl Harbor, Punchbowl and my Grandparents The Top 10, Top 10 Predictions for 2015 And a couple special holiday themed entries from years past. e-card Malware X marks the Games ps Related Blog Roll 2013 Blog Roll 2012 Blog Roll 2011 Technorati Tags: f5,big-ip,security,cloud,mobile,video,silva,2014,blogs,iot,things Connect with Peter: Connect with F5:292Views0likes0CommentsThe Top 10, Top 10 Predictions for 2015
The time of year that crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen. IDC Reveals Worldwide Internet of Things Predictions for 2015 - So 2014, according to last year's proclamations, was the break out year for the Internet of Things (Iot) and it didn't disappoint. IoT is everywhere and IDC offers their take for 2015. Cloud, security & network capacity all come into play when wearables, embedded systems and smart cities overrun our society. Gartner Identifies the Top 10 Strategic Technology Trends for 2015 - Gartner announced their technology trends that will be strategic for most organizations in October with IoT, Everywhere Computing and 3D Printing topping the list. They also include the rise of Smart Machines, Software defined systems and the recognition that it is not possible to provide a 100 percent secured environment. Once organizations acknowledge that, they can begin to apply more-sophisticated risk assessment and mitigation tools. Seven Cloud Security Predictions for 2015 - OK, not 10 but 7 interesting cloud security predictions from Perspecsys. With more breaches and surveillance it is important to secure sensitive data while maintaining application functionality. True that. They talk about how Private Clouds will continue growth, the rise of Intellectual data in the cloud, mobile-first development, breach insurance and how the cloud is redrawing the IT security line. More Cloud Data Breaches ‘Inevitable’ in 2015, Forrester Says - Robert Graham reviews Forrester's Predictions 2015: The Days of Fighting the Cloud are Over which talks about how cloud breaches are inevitable but it will probably happen through some typical business process or lack of training rather than a direct cloud hit. Forrester also says that Docker containers will become a slam dunk, that there will be a surge in industry-specific, software-as-a-service product (IoT?) and Software-as-a-service vendors will creep toward hybrid rollouts. Top 10 Tech Predictions for 2015 - Over on LinkedIn Dr. Hossein Eslambolchi, Chairman and CEO at CyberFlow Analytic, offers his 2015 take. He notes that that Applications must be the center (of the universe), that Data Intensive Applications Will Rule Wireless IP and that Cloud Computing Will Plateau among his futures. Security Predictions for 2015 and Beyond - Trend Micro has their annual report out called The Invisible Become Visible on how more cybercriminals with use darknets to share attack tools, stage attacks and sell the ill-gotten gains.We'll be sharing more data, our passwords will still be a target and an exploit kit specifically targeting Android will appear. Top cybersecurity predictions of 2015 - ZDNet offers a slideshow (with text) with their perception. While our healthcare info is always at risk, there will be new players and vulnerabilities geared toward stealing that plus a whole lotta other stuff since Information is a digital goldmine. Also, as more IoT devices connect, there will be attacks targeting your thermostat, car or coffee machine. I called it over a year ago but there you have it. IDC: Top 10 Technology Predictions For 2015 - Yea, I had IDC at the top for IoT but this is their overall report. Forbes goes over this report where new technologies (cloud, mobile, big data, and the Internet of Things — and an exploding number of solutions built on them) will see 100% growth. Worldwide IT and telecommunications spending will grow 3.8% in 2015 to more than $3.8 trillion. Wireless data will grow, innovative partnerships will form, cloud is the new data center and China will have huge influence. Interesting read here. 2015 Timeline - FutureTimeLine.net has an interesting list of upcoming 2015 events. While technology driven, many look at achievements and plans rather than wishes and guesses. For instance, in 2015 The first solar aircraft to circumnavigate the globe will make an attempt, there will be The first self-regulating artificial heart, that Electric car ownership reaches 1 million worldwide and The New Horizons probe arrives at Pluto. It just woke up from the 9 year trip yesterday! 26 Hilariously Inaccurate Predictions About the Future - And for some fun, nostalgia and history here are some predictions that just never came true. From personal helicopters to rocket belts to homes made of steel, many come with the original story. ps Related The Top 10, Top 10 Predictions for 2014 The Top 10, Top 10 2013 Predictions The Top 10, Top Predictions for 2012 Technorati Tags: 2014,2015,predictions,future,technology,security,cloud,iot,silva,f5 Connect with Peter: Connect with F5:517Views0likes0CommentsThe Top 10, Top 10 Predictions for 2014
This time of year the crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen. Cybersecurity in 2014: A roundup of predictions: ZDNet might have picked up that I have done this for the past two years and Charles McLellan put together his own collection. This is a good place to start with lists from Symantec, Websense, FireEye, Fortinet and others. Mobile malware, zero-days, encryption, 'Internet of Things,' and a personal favorite, The Importance of DNS are amongst many predictions. Eyes on the cloud: Six predictions for 2014: Kent Landry - Senior Consultant at Windstream focuses on Cloud futures in this Help Net Security piece. Hybrid cloud, mobility and that pesky Internet of Everything make the list. 5 key information security predictions for 2014: InformationWeek has Tarun Kaura, Director, Technology Sales, Symantec discuss the coming enterprise threats for 2014. Social Networking, targeted attacks, cloud and yet again, The Internet of Things finds a spot. Top 10 Security Threat Predictions for 2014: This is essentially a slide show of Fortinet's predictions on Channel Partners Telecom but good to review. Android malware, increased encryption, and a couple botnet predictions are included. 2014 Cyber Security Forecast: Significant healthcare trends: HealthITSecurity drops some security trends for healthcare IT security professionals in 2014. Interesting take on areas like standards, audit committees, malicious insiders and supply chain are detailed. 14 IT security predictions for 2014: RealBusiness covers 10 major security threats along with four ways in which defenses will evolve. Botnets, BYOD, infrastructure attacks and of course, the Internet of Things. 4 Predictions for 2014 Networks: From EETimes, this short list looks at the carrier network concerns. Mobile AAA, NFV, 5G and once again, the Internet of Things gets exposure. 8 cyber security predictions for 2014: InformationAge goes full cybercriminal with exploits, data destruction, weakest links along with some 'offensive' or retaliatory attack information. Verizon's 2014 tech predictions for the enterprise: Another ZDNet article covering the key trends Verizon believes will brand technology. Interest includes the customer experience, IT decentralization, cloud and machine-to-machine solutions. Research: 41 percent increasing IT security budget in 2014: While not a list of predictions, this article covers a recent Tech Pro Research survey findings focused on IT security. The report, IT Security: Concerns, budgets, trends and plans, noted that 41 percent of survey respondents said they will increase their IT security budget next year. Probably to counter all the dire predictions. A lot to consider as you toast the new year with the Internet of Things making many lists. The key is to examine your own business and determine your own risks for 2014 and tackle those first. ps Related: The Top 10, Top 10 2013 Predictions The Top 10, Top Predictions for 2012 Technorati Tags: 2014,predictions,trends,security,IT,cloud,breach,risk,f5,silva,IoT Connect with Peter: Connect with F5:491Views0likes1CommentHello to the F5 APJ Blog
Thanks for joining us on the F5 Blog! Here‘s where you can access the latest news and views on the tech industry in the APJ region – from insights and trends to commentaries. F5’s team of subject matter experts will be explaining, discussing and pondering the issues affecting enterprises across all industries. We are ready to kick-off 2014 with our ‘F5 predictions’ series. This will cover our F5 experts’ perspectives and predictions for the year ahead. With Gartner predicting that IT spending will hit $3.8 trillion in 2014 - an increase of 3.6 per cent compared to last year. The question many of us will be asking is what are the priorities? New devices and technologies will dominate our personal and business lives and ‘social intelligence’ will become more important. More on this will follow shortly. So bookmark our F5 blog to keep with the latest technology trends from across the region. And of course, we encourage you to engage with our posts and share your input. We’d further love to get your feedback on what you want to see discussed in the future. We look forward to hearing from you! For more information on F5, our partners, and technologies please check out our Twitter page.199Views0likes0CommentsSecurity is a process
A newspaper report recently warned that many IT products and applications, including payment systems, lack adequate security. The reasons cited are that firstly, security is treated as an afterthought, and secondly, because trained practitioners are not involved in the design and implementation. F5 views security as a process. It should be managed as such. There’s an important role for the security experts who build the policies that ensure security and compliance within the organization. And, there’s an equally important role for the programmers who develop the software. But the two are quite distinct from each other. Business applications are the critical assets of an enterprise. Its security should not be just left to the software engineers to decide because they are not security professionals. Therefore, the prudent approach is to offload the burden of coding security policies from the software programmers onto credible security solutions professionals. Viewed from that perspective, security is as an end-to-end process, with policies to govern the various areas wherever there is user interaction with the enterprise – device, access, network, application and storage. Given the complexities of the different moving parts, it sometimes makes sense to combine several of the point security concerns into a converged solution. In short, this is akin to process simplification not too different from what consultants would call “BPR" in the business world. However way, you see it, from a CFO perspective, this represents immense cost savings boh operationally as well as in capital costs. For example, when it comes to application security, the trend is to build it into the application delivery controllers. ADCs are designed to natively deliver applications securely to end users. In today’s context, ADCs act as secured gatekeepers to the applications; they prevent unauthorised access and are able to add-on capabilities to mitigate complex application level attacks such as those defined by OWASP. However, the situation is growing more complex. CIOs are increasingly faced with the task of balancing the needs of a younger, empowered and demanding Gen Y workforce who want the freedom to work from their device of choice as well as the ability to switch seamlessly between their social and enterprise networks. The CIO challenge is how to protect the company’s business assets in the face of increasing and more complex threats. Add to this the desire to leverage the cloud for cost control and scale and the security considerations can potentially spiral out of control. The situation calls for innovative security solutions that can understand the behaviour of enterprise applications as well as user behaviour, and be able to enforce corporate security policies effectively with minimum impact on user experience. F5 believes that security is a trust business. Having the right process and policies trumps choosing a vendor. It is the policies and process that determine the required solution, not vice versa. For a Japanese version of this post, please go here.305Views0likes0CommentsOK 2014, Now What
So I've been staring at this blinking cursor for the last 5 minutes wondering what story to tell. 'Once upon a time, there was a....' No that won't work. 'It was a dark and dreary night as our protagonist grudgingly dragged his feet toward the impending...' No, not that either. How about, 'The waves were big, mean and fast that day...the kind of day where Eddie would go.' Nah, too local boy. After a few weeks break and with so much going on within information technology, I sometimes find it difficult to zero in on something interesting with so many choices. So I decided to do a mini blog buffet....the best in town, I say! The big news this week seems to be the Consumer Electronics Show (CES). From connected and driverless cars to interactive kitchens to wearable technology to the massive ultra HD televisions to even toothbrushes, the internet of things is certainly posed to take over the world in 2014. There are, of course, risks with all these embedded systems. There was the Target breach right at the height of the holiday shopping season nailing 40 some million (now 70 million) credit and debit cards in the process. I had a browser tab The 10 Worst Data Breaches of 2013 saved since before the new year for an article but this most recent debacle will certainly make all of 2014's lists. I was in Target a couple days ago retuning something and the person in front of me was asked, 'Do you want cash or credited back on the card?' He dryly answered, 'Well, I got a letter from my bank this week saying they are replacing my card due to your breach, so I'll just take the cash.' Mine was an even exchange. There was the FireEye - Mandiant deal struck slightly before the ball dropped and announced after the 12th ding. Interesting blend of attack detection along with attack response. The timing seemed perfect in the wake of the Target news. There was the Snapchat breach, the Yahoo malware, the WoW attack and certainly all the 'national security' news. And finally, our very own John McAdam earned Puget Sound Business Journal Executive of the Year for 2013. I first met John when I joined F5 in 2004. We had less than 1000 employees at the time and our sales conference that year was at a local Seattle hotel. During one of the breaks, Ken Salchow took me over to introduce me to McAdam, who was sitting in a chair fiddling with his blackberry. Now you'd think that the first time meeting your CEO you'd be all proper, business-like...Sir. Not me. As Ken did the formalities, the first words out of my mouth were, 'What's your high score on brick breaker?' John's face lit up with a smile, a determination in his eye and without missing a beat, shoved his phone in my face and taunted, 'Can you beat that?' It was wonderful and crushing at the same time since his score trounced mine. This was well before internet on planes and playing brick breaker was a way to pass time in the air. For the next several months as we did our individual business travel, we would send each other our high score(s) wrapped in a bit of bragging. There was actually a few of us on the thread, all hoping to blast the others. Then one day, one of the competitors (who had been on an overseas flight if I remember correctly) sent a score that blew everyone away. That was it, game over. But I'll never forget how the CEO included a relatively new guy into a fun little group of folks trying to one up each other. I've been here ever since. Welcome to the Year of the Horse! ps Related: Top 10 products revealed at CES 2014 so far Customers paying the price after Target breach The 10 Worst Data Breaches of 2013 The Internet of Things and DNS Looking to 2014 Executive of Year: F5 Networks CEO John McAdam strikes the perfect balance Technorati Tags: 2014,breach,security,target,mcadam,f5,malware,ces,IoT,silva,attacks Connect with Peter: Connect with F5:315Views0likes0Comments