The Open Web Application Security Project (OWASP) is focused on improving the security of software. Their mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks and their OWASP Top 10 provides a list of the 10 Most Critical Security Risks. For each risk it provides a description, example vulnerabilities, example attacks, guidance on how to avoid and references to OWASP and other related resources. Many of you are familiar with their Top 10 Most Critical Web Application Security Risks. They provide the list for awareness and guidance on some of the critical web applications security areas to address. It is a great list and many security vendors point to it to show the types of attacks that can be mitigated.
Do you avoid stores that have had a credit card breach?
You are not alone. About 52% of people avoid merchants who have had a data breach according to a recent Lowcards survey. They surveyed over 400 random consumers to better understand the impact of identity theft on consumer behavior. 17% said they or a family member was a victim of identity theft over the last year with half the cases being credit card theft. 94% said they are more concerned or equally concerned about ID theft. They estimate that there were 13.5 million cases of credit card identity theft in the United States over the last 12 months.
The mobile platform, meaning tablets and smartphones, now account for 60% of total digital media time spent according to comScore. This is a 10 point jump from 50% just a year ago. On top of that, mobile apps accounted for 51% of all digital media time spent in May 2014. Many of the content categories like radio, photos and maps are becoming almost exclusively mobile. Digital radio and photos both generate 96% of their engagement from mobile while maps and instant messaging get 90% of interaction from mobile devices.
This week in the States, the Nation celebrates it’s Independence and many people will be attending or setting off their own fireworks show. In Hawaii, fireworks are shot off more during New Year’s Eve than on July 4th and there is even Daytime Fireworks now.
Cloud computing is exploding like fireworks with all the Oooooooo’s and Ahhhhhhh’s of what it offers but the same groan, like the traffic jam home, might be coming to an office near you.
I wrap it up from Velocity Conference 2014. Special thanks to Dawn Parzych, Robert Haynes, Cyrus Rafii and John Giacomoni for joining us on camera along with Robert, Courtney, and Natasha behind the lens. Also learn what the top questions were this week at F5 booth 800. Reporting from the Santa Clara Convention Center, thanks for watching!
Dawn Parzych, F5 Sr. Product Manager, returns to demo BIG-IP’s Image Optimization solution. Web images can consume up to 60% of a site load and BIG-IP can significantly reduce the image file size and deliver those pictures much faster to the viewer.
John Giacomoni, LineRate Founder and Sr Architect, joins us to give the lowdown on F5’s TMOS proxy and LineRate proxy. John does a great job explaining the nuances of each, how they function within architecture and the associated deployments within an organization. Each can be deployed individually or work together in concert. If you wondered also, watch this video.
Dawn Parzych, F5 Sr. Product Manager, talks about the benefits of HTTP 2.0 and shows us a demo of 170+ pictures appearing instantly while using the BIG-IP HTTP 2.0 profile. Interesting conversation about web pages loads, the chattiness of the HTTP protocol and the notion of HTTP 2.0 moving forward. Learn more at: www.f5.com/products/modules/application-acceleration-manager
Cyrus Rafii, F5 Director of Business Development for LineRate, shares what LineRate is, the challenges that it solves and the benefits it provides DevOps. He also walks us through the new LineRate Storefront allowing organizations to download & deploy LineRate quickly and easily. Learn more at: linerate.f5.com
Robert Haynes, F5 Marketing Services Architect, gives us a preview of the new Acceleration Reference Architecture and shares 3 simple ways you can optimize your application traffic with BIG-IP. Learn more at Synthesis.f5.com
I show you how to find F5 booth 800 at Velocity Conference 2014 in Santa Clara. Velocity focuses on Web Operations and Performance with half of the attendees involved with web and mobile development. We are showcasing our acceleration and optimization solutions making any app a fast app along with the new LineRate Storefront. The show floor was very loud and I think my mic batteries were dying (since replaced) so the audio is not as optimal as I would like but you can still hear fine.
I try not to brag that much (yea right) since a long time ago a good friend would always quip, ‘Everyone loves a bragger!’ Noting that boasters are usually more talk than anything and it is important to stay humble. Well, I’m humbled (and bragging) that I’ve reached an important milestone with F5. Ten years on the job. Yup, a decade with F5. Around 20% of my life has been with F5 and I still enjoy it all. Seriously.
Lori MacVittie, Sr. Product Manager Emerging Technologies, discusses the future of the cloud and where do we go from here. She talks about some of barriers, tools and solutions to take cloud adoption to the next level along with how DevOps and Cloud play together.
You often hear people say, ‘oh, this is a living document,’ to indicate that the information is continually updated or edited to reflect changes that may occur during the life of the document. Your infrastructure is also living and dynamic. You make changes, updates or upgrades to address the ever changing requirements of your employees, web visitors, customers, partners, networks, applications and anything else tied to your systems.
This is also true for F5’s Reference Architectures. They too are living architectures.