Fear and Loathing ID Theft

Posted in security, f5, silva, banking, mobile, cybercrime, people, access, data loss by psilva on July 22nd, 2014

Do you avoid stores that have had a credit card breach?

You are not alone. About 52% of people avoid merchants who have had a data breach according to a recent Lowcards survey. They surveyed over 400 random consumers to better understand the impact of identity theft on consumer behavior. 17% said they or a family member was a victim of identity theft over the last year with half the cases being credit card theft. 94% said they are more concerned or equally concerned about ID theft. They estimate that there were 13.5 million cases of credit card identity theft in the United States over the last 12 months.

These concerns are also changing the way some people shop.

Over half (56%) are taking extra measures to protect themselves from identity theft. Some of these behaviors include using a debit card less (28%), using cash more (25%), ordering online less (26%) and checking their credit report more (38%). These are all reasonable responses to the ever challenging game of protecting your identity and is important since 89% of security breaches and data loss incidents could have been prevented last year, according to the Online Trust Alliance's 2014 Data and Breach Protection Readiness Guide.

The game is changing however, and mobile is the new stadium. Let's check that scoreboard.

Most of the security reports released thus far in 2014, like the Cisco 2014 Annual Security Report and the Kaspersky Security Bulletin 2013 show that threats to mobile devices are increasing. We are using them more and using them for sensitive activities like shopping, banking and storing personally identifiable information. It is no wonder that the thieves are targeting mobile and getting very good at it. Kaspersky's report talks about the rise of mobile botnets and the effectiveness since we never shut off our phones. They are always ready to accept new tasks either from us or, a foreign remotely controlled server with SMS trojans leading the pack. Mobile trojans can even check on the victim's bank balance to ensure the heist is profitable and some will even infect your PC when you USB the phone to it.

stat_ksb_2013_04.png

Distribution of exploits in cyber-attacks by type of attacked application

I guess the good news is that people are becoming much more aware of the overall risks surrounding identity theft and breaches but will the convenience and availability of mobile put us right back in that dark alley? Mobile threats are starting to reach PC proportions with online banking being a major target and many of the potential infections are delivered via SMS messages. Sound familiar?

Maybe we can simply cut and replace 'PC' with 'Mobile' on all those decade old warnings of:

Watch what you click!

ps

Related

 

 

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]



Apps Driving Attention

Posted in f5, silva, application delivery, mobile, social media, smartphone, human behavior, access by psilva on July 14th, 2014

The mobile platform, meaning tablets and smartphones, now account for 60% of total digital media time spent according to comScore. This is a 10 point jump from 50% just a year ago. On top of that, mobile apps accounted for 51% of all digital media time spent in May 2014. Many of the content categories like radio, photos and maps are becoming almost exclusively mobile. Digital radio and photos both generate 96% of their engagement from mobile while maps and instant messaging get 90% of interaction from mobile devices.

You might be wondering, like I did, where do social networks come in since it seem like almost everyone updates their social feeds through mobile. Social is actually the #1 category for overall digital engagement taking about 20% of overall digital time spent and gets 71% of it's activity from mobile. It, social media engagement on mobile, has grown 55% over the last year and has accounted for 31% of all growth of internet engagements.

ShareofTimeSpentbyPlatformLeadingCategor

So who is driving the mobile app explosion? Teenagers. About 60% of 12 to 17 year olds had a smartphone in 2013, topping even the 45+ crowd for smartphone ownership, according to Arbitron and Edison Research. The app money makers are not the initial charge for the program but all the in-app purchases along with the ads attached to the app.

Mobile is clearly the new way we consume digital content and continues to grow. We are also interacting with specific apps rather than browsing and those apps are growing at an amazing pace. Today's infrastructure needs to be even more flexible, intelligent and resilient to handle the surge. And ultimately, the apps and the content/experience they provide need to be highly available and delivered quickly and securely to the person...just like any other typical application.

ps

Related:

 

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]



Velocity 2014 – That’s a Wrap!

Posted in f5, big-ip, silva, video, optimization, infrastructure, velocity by psilva on July 2nd, 2014

Peter Silva wraps it up from Velocity Conference 2014. Special thanks to Dawn Parzych, Robert Haynes, Cyrus Rafii and John Giacomoni for joining us on camera along with Robert, Courtney, and Natasha behind the lens. Also learn what the top questions were this week at F5 booth 800. Reporting from the Santa Clara Convention Center, thanks for watching!

Watch Now:



Velocity 2014 – BIG-IP Image Optimization (feat Parzych)

Dawn Parzych, F5 Sr. Product Manager, returns to demo BIG-IP’s Image Optimization solution. Web images can consume up to 60% of a site load and BIG-IP can significantly reduce the image file size and deliver those pictures much faster to the viewer.

Watch Now:



Velocity 2014 – TMOS & LineRate: A Tale of Two Proxies (feat Giacomoni)

Posted in f5, big-ip, cloud computing, silva, video, application delivery, social media, velocity, linerate by psilva on July 2nd, 2014

John Giacomoni, LineRate Founder and Sr Architect, joins us to give the lowdown on F5’s TMOS proxy and LineRate proxy. He explains the nuances of each, how they function within architecture and the associated deployments within an organization. Each can be deployed individually or work together in concert. If you wondered also, watch this video.

Watch Now:



Velocity 2014 – HTTP 2.0 Gateway (feat Parzych)

Posted in f5, big-ip, acceleration, silva, video, optimization, infrastructure by psilva on June 26th, 2014

Dawn Parzych, F5 Sr. Product Manager, talks about the benefits of HTTP 2.0 and shows us a demo of 170+ pictures appearing instantly while using the BIG-IP HTTP 2.0 profile. Interesting conversation about web pages loads, the chattiness of the HTTP protocol and the notion of HTTP 2.0 moving forward. Learn more at: www.f5.com/products/modules/application-acceleration-manager

Watch Now:



Velocity 2014 – LineRate Storefront

Posted in f5, acceleration, silva, optimization, programmability, velocity, linerate by psilva on June 25th, 2014

Cyrus Rafii, F5 Director of Business Development for LineRate, shares what LineRate is, the challenges that it solves and the benefits it provides DevOps. He also walks us through the new LineRate Storefront allowing organizations to download & deploy LineRate quickly and easily. Learn more at: linerate.f5.com

Watch Now:



Velocity 2014 - Acceleration Reference Architecture

Robert Haynes, F5 Marketing Services Architect, gives us a preview of the new Acceleration Reference Architecture and shares 3 simple ways you can optimize your application traffic with BIG-IP. Learn more at Synthesis.f5.com


Watch Now:



My Ten Years at F5

Posted in Uncategorized, f5, big-ip, silva, application delivery, history, 2014 by psilva on June 19th, 2014

So far...

10yr.jpg

I try not to brag that much (yea right) since a long time ago a good friend would always quip, 'Everyone loves a bragger!' Noting that boasters are usually more talk than anything and it is important to stay humble. Well, I'm humbled (and bragging) that I've reached an important milestone with F5. Ten years on the job. Yup, a decade with F5. Around 20% of my life has been with F5 and I still enjoy it all. Seriously.

I joined in 2004 - 'duh' if you can count years - as part of what was our original Security Business Unit. F5 had recently acquired uRoam in 2003, SSLVPN technology which eventually became our FirePass and Access Policy Manager solutions along with Magnifire WebSystems in 2004 which bore our TrafficShield and Application Security Manager web application firewalls. Our task, at the time, was to help our customers understand and deploy remote access systems and secure their applications. The early stages of F5 moving into the security market. Look at us now.

It was fun being one of the first three Security Systems Architects at F5. My good pals Ken Salchow (now running Certification) and Charlie Cano (Sr. BD Solution Architect) rounded out the 3 headed monster. We would visit with customers sharing insight on current security threats - which at the time were things like SQL injections, forceful browsing, parameter tampering and many of the same threats still dogging companies today. We spoke about the benefits of SSL VPN over IPSec. Remember those arguments? We also ran around the country installing F5 security controllers and troubleshooting them when things went astray. It was a busy but exciting time and I learned a bunch during those first couple years. But we grow.

That same 2004, F5 released BIG-IP v9 with TMOS, iRules, and a full proxy architecture. Terminate the network connection at the BIG-IP, decrypt/inspect/manipulate/secure/manage traffic and establish a new connection to the server. This gives organizations the ability to modify TCP traffic in either direction. A few years later, 2009, we released v10. By then however, I had moved on to Marketing.

In 2006, I jumped at an opportunity to join the fledgling Technical Marketing team, led by Ken Salchow. The same Ken as above. We were the technical writers, speakers and resources for the marketing organization. We did whitepapers, articles, blogging along with speaking at conferences and briefing analysts. We were unique, in that, instead of just focusing on F5 solutions, we were focused on a technology area. Virtualization, Security, Core, Service Provider, you get the idea. So we needed to understand the technologies and trends first to determine how our solutions solved or didn't solve certain industry challenges. Great team and enjoyable work. I've been fortunate.

Also in 2006, my daughter was born and 10 months later we were in the hospital for two weeks due to a rare genetic condition. She's doing OK today but back then, we had no idea what was happening or if she was going to even make it. I still remember getting a call from the EVP of my department telling me to take care of my family first and not to worry about work. Take whatever time you need. I was blown away. Granted, F5 was a much smaller company then and we all pretty much knew each other but I was so touched that the company cared more for my family's well being than me getting my work done. Now many F5ers are more than just F5 family, they are 'Ohana.

In 2009, I started to produce F5 videos - ALOHA! Initially, videos were not a huge part of how we told our story or shared insight but felt it would become an  important communication tool for business. I created the In 5 Minutes or Less series to show how easy it was to deploy certain functionality within a BIG-IP, especially the new v9 stuff. I also started to cover our trade shows, doing video interviews to showcase F5 technology, the integration with partners, and the important trends in the industry. This is what I love most.

You see, I studied theatre in college and dreamed of being an actor, director or producer. Something in the entertainment industry. My dad worked 30 years for IBM so I grew up with computers in the house. In every theatre I worked in, I also (in part) was the ad-hoc systems administrator. I remember playing with AppleTalk in the early 90's and admin'ing laptops with NT 3.51/4 around the same time. I was also fortunate to think back then that the internet just might become our entertainment medium of the future. I quit the theatre and started to work in technology. Fast forward to today and I feel extremely lucky to be able to combine what I know and what I love to create technology related videos. Here at F5.

And most recently, while still carrying the TMM banner, I'm part of the awesome Marketing Architectures Team at F5. We design and develop the Reference Architectures that organizations can deploy today to solve a bunch of industry challenges. Areas like security, mobility, availability, performance and access & identity all have specific reference architectures covering things like DDoS, DNS, Application Services and Cloud to name a few. Still thrilled.

Ten years is a long time at any company these days and I've been blessed this last decade being able to do my thing with such a great organization. Thanks to everyone who has helped along the way!

I am grateful.

ps

 

 

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]



CloudExpo 2014: Future of the Cloud

Lori MacVittie, Sr. Product Manager Emerging Technologies, discusses the future of the cloud and where do we go from here. She talks about some of barriers, tools and solutions to take cloud adoption to the next level along with how DevOps and Cloud play together.

 

ps

 

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]
Watch Now:




« Previous entries ·