Archived Events
The challenge for many higher education institutions is balancing security with easy access for legitimate users. Unwanted or malicious automated traffic, like credential stuffing, make up anywhere from 50-90% of an average enterprise’s online and mobile traffic – resulting in account takeover. Most education ...
Government Agencies and Higher Education will always be attractive cyberattack targets, but how can you turn the tables on the attackers and their bots without major investment in time and resources? There is a way to keep your critical apps available that is secure, as well as cost-effective and practical, to operate and ...
Over 50% of organizations pursuing digital transformation are changing how they develop, deploy, and operate applications—in short, they're modernizing. But building modern apps is a significant lift and requires things like support for multi-cloud, automation, self-service workflows, app-centric visibility, ...
In this workshop, we reviewed NGINX Controller features, teaching you how to easily manage multiple NGINX Plus instances, configure load balancing and gateways, and set alerts based on the metrics collected by NGINX Controller.
F5 brought together some of the most respected names for a discussion on Zero Trust Architecture - Scott Rose, Computer Scientist at NIST and co-author on NIST’s 800-207 Zero Trust Architecture publication, Gerald Caron, Director of Enterprise Network and 17-year veteran of the Department of State, and Brandon Iske, ...
F5 has observed a huge increase in fraudsters targeting student application portals of educational institutions. These fraudsters apply for student applications in order to get access to .edu email accounts. This results in FAFSA fraud, ballooning software licensing costs, infrastructure issues, and requiring labor ...
F5 and Carahsoft held a roundtable with Dan Woods, head of the Shape Security Intelligence Center and former CIA and FBI special agent, and facilitated a discussion with fellow security leaders.Topics included, but were not limited to:Separating fake users from real ...
In this webinar, F5 Networks and Carahsoft discussed security solutions F5 Silverline and Shape Security, and their use cases for Public Sector organizations.
Did you know the latest generation of F5 hardware is nearing end of life? Do you know what that means for your organization? Are you prepared? F5 and Carahsoft held a webinar on how you can lower your TCO by consolidating your aging BIG-IP appliances to take advantage of a dramatic ...
F5 and Carahsoft held a webinar on how to protect your organization from cyber threats targeting educational institutions by mitigating fake account creations and credential stuffing attacks. For as little as $5, cybercriminals can buy legitimate .edu credentials and access all of the benefits that come with ...