F5 DevCentral
F5 DevCentral
  • 1 651
  • 8 594 760
TorontoAcademy
DevCentral's Aubrey King got a chance to journey to gorgeous (and steamy hot!) #Toronto in Ontario, Canada for our F5 Academy, where we had a lab on Distributed #Cloud for #API security and discoverability, as well as an up close and personal look at Next Access! He got to talk to the attendees a bit about #DevCentral and also about some AI security basics and F5's role.
If you didn't make this one, don't fret! One may be coming to a city near you!
www.f5.com/go/event/north-america-academy-api-security?
⬇️⬇️⬇️ JOIN THE COMMUNITY! ⬇️⬇️⬇️
DevCentral is an online community of technical peers dedicated to learning, exchanging ideas, and solving problems - together.
Find all our platform links ⬇️ and follow our Community Evangelists! 👋
➡️ DEVCENTRAL: community.f5.com
➡️ CZcams: czcams.com/users/devcentral
➡️ LINKEDIN: www.linkedin.com/showcase/f5-devcentral/
➡️ TWITTER: devcentral
Your Community Evangelists:
👋 Jason Rahm: www.linkedin.com/in/jrahm/ | jasonrahm
👋 Buu Lam: www.linkedin.com/in/buulam/ | buulam
👋 Aubrey King: www.linkedin.com/in/aubreyking | aubreykingf5
zhlédnutí: 71

Video

Customer driven site deployment using AWS and F5 XC Terraform module
zhlédnutí 248Před dnem
This video demonstrates how to leverage Terraform module to deploy customer driven F5XC CE site. 0:00 Introduction 0:39 Prepare environment 5:50 Change input variables 9:40 Deploy topology ⬇️⬇️⬇️ JOIN THE COMMUNITY! ⬇️⬇️⬇️ DevCentral is an online community of technical peers dedicated to learning, exchanging ideas, and solving problems - together. Find all our platform links ⬇️ and follow our C...
SSL Orchestrator Demo on BIG-IP Next using Central Manager and Automation
zhlédnutí 179Před 14 dny
This demo video shows you how to configure SSL Orchestrator on BIG-IP Next using the Central Manager and Automation. For more information, check out this article: community.f5.com/kb/technicalarticles/what’s-coming-in-big-ip-next-access-and-ssl-orchestrator/329525 ⬇️⬇️⬇️ JOIN THE COMMUNITY! ⬇️⬇️⬇️ DevCentral is an online community of technical peers dedicated to learning, exchanging ideas, and ...
NGINX One: Simplified Management For All Your NGINX Deployments
zhlédnutí 131Před 14 dny
Discover how NGINX One can simplify the management of all your NGINX deployments. As organizations scale, challenges arise in keeping NGINX instances updated, secure, and compliant with best practices. NGINX One offers a comprehensive SaaS solution that provides: • Visibility into all your NGINX deployments • Automated upgrades and security alerts • Configuration inspection for policy complianc...
WebAssembly Async and Streams - Ep 8 - WebAssembly Unleashed
zhlédnutí 96Před 14 dny
In this episode our hosts are joined by Fastly’s Luke Wagner to discuss WebAssembly, async, and streams. Listen in to learn about the history and evolution of ASMJS, find out if sync and async functions will split WebAssembly, get a rundown on the concept of backpressure, and hear discussion regarding Joel Dice’s project ISYSWASFA (who you might get to hear from soon, so subscribe for future ep...
Addressing the needs of UK businesses
zhlédnutí 44Před 14 dny
"🔒 It's Infosecurity Europe 2024! 🔐 We caught up with Jon McKellar, UK Country Manager for @F5, to talk about the dynamic cybersecurity scene in the UK and how F5 is leading the charge with innovative solutions and strategic acquisitions. 🌐 🎉 Celebrating 5 years at F5, Jon shares insights on the industry's shift towards robust risk management and F5's strong stance on data privacy & sovereignty...
AI vs AI to protect APIs
zhlédnutí 101Před 14 dny
This week at #InfosecEurope2024, F5's own David Warburton & Keiron Shepherd dive into the future of cybersecurity! Learn how #AI and APIs are shaping our defenses against sophisticated attacks. Missed the workshop? Fear not! Access top-notch insights from F5 Labs' latest research on our website. 🌐 Discover how we're leveraging AI to stay ahead of threats. Plus, check out the Identity Threat Rep...
AI discussions and deployments in the UK
zhlédnutí 39Před 14 dny
🔒🌐 At InfoSecurity Europe 2024, Buu chats with Tristan Liverpool, SE Director at F5, to discuss the evolving landscape of AI in cybersecurity! With 14 years at F5, Tristan shares insights on managing complex workloads and ensuring robust AI security across various industries. Data privacy in EMEA? F5's got it covered with their Distributed Cloud Regional Edges. 🛡️💻 We explore how F5 is steering...
What is the DORA regulation?
zhlédnutí 159Před 14 dny
🔒 Unlock the Future of Cybersecurity with F5 at Infosecurity Europe 2024! Meet Bart Salaets, our EMEA Field CTO & Solutions Architect Leader, as he sheds light on the new DORA regulations impacting financial institutions. Discover how F5 secures applications & APIs against rising cyber threats and ensures compliance with DORA's stringent requirements. 👟 Plus, swing by Stand E140 for a chance to...
Welcome to Infosecurity Europe 2024!
zhlédnutí 118Před 14 dny
"🎉 Come join us at Infosecurity Europe 2024! 🇬🇧 Our very own Buu from the F5 DevCentral team is thrilled to be part of this dynamic event. Don't miss out: 👟 Swing by F5's booth E140 for a chance to win stylish red Nike Air Force 1s EVERY DAY! 🧠 Learn from the best at our engaging workshops with experts Keiron Shepherd & David Warburton from our Solution Architecture and F5 Labs teams. 🎬 Stay tu...
How To Get Into Security Authoring With Steve Wilson And Ken Huang At #RSAC 2024
zhlédnutí 107Před 21 dnem
Aubrey King, DevCentral Evangelist, got the chance to catch up with Steve Wilson and Ken Huang, from The OWASP Top 10 For LLM Applications, about the books they've written on generative AI and books they're currently writing. They share a ton of tips about starting off, getting going with a publisher and more. If you want to know how to get into security authoring, this video is for you! ⬇️⬇️⬇️...
Akira Brand At RSAC 2024 - Speaking At Conferences, How To Get Your Paper Considered
zhlédnutí 51Před 21 dnem
Akira Brand At RSAC 2024 - Speaking At Conferences, How To Get Your Paper Considered
Episode 22 - May 2024 - Security Authoring, Speaking At RSAC
zhlédnutí 148Před 21 dnem
Episode 22 - May 2024 - Security Authoring, Speaking At RSAC
Winner takes all on the pickleball court! 🏓 - Red Hat 2024
zhlédnutí 93Před 21 dnem
Winner takes all on the pickleball court! 🏓 - Red Hat 2024
Automate a Deployment of BIG-IP Next SSL Orchestrator
zhlédnutí 170Před 28 dny
Automate a Deployment of BIG-IP Next SSL Orchestrator
How To Find HTTP User-Agent From A PCAP File
zhlédnutí 177Před měsícem
How To Find HTTP User-Agent From A PCAP File
Introducing F5 Distributed Cloud Web App Scanning
zhlédnutí 318Před měsícem
Introducing F5 Distributed Cloud Web App Scanning
Discover the F5 Distributed Cloud Terraform examples GitHub repository
zhlédnutí 67Před měsícem
Discover the F5 Distributed Cloud Terraform examples GitHub repository
Automating security with F5, Dynatrace, and Ansible - Red Hat Summit 2024
zhlédnutí 274Před měsícem
Automating security with F5, Dynatrace, and Ansible - Red Hat Summit 2024
Recapping innovation and community at Red Hat Summit 2024
zhlédnutí 81Před měsícem
Recapping innovation and community at Red Hat Summit 2024
Overcoming automation challenges with BIG-IP Next - Red Hat Summit 2024
zhlédnutí 95Před měsícem
Overcoming automation challenges with BIG-IP Next - Red Hat Summit 2024
Red Hat and Open Source AI offerings - Red Hat Summit 2024
zhlédnutí 115Před měsícem
Red Hat and Open Source AI offerings - Red Hat Summit 2024
How to build community in tech with Michael O'Leary - Red Hat Summit 2024
zhlédnutí 56Před měsícem
How to build community in tech with Michael O'Leary - Red Hat Summit 2024
Automation transformation: how to start simple and build from there - Red Hat Summit 2024
zhlédnutí 65Před měsícem
Automation transformation: how to start simple and build from there - Red Hat Summit 2024
Configuring Inbound Gateway Mode on BIG-IP Next SSL Orchestrator
zhlédnutí 73Před měsícem
Configuring Inbound Gateway Mode on BIG-IP Next SSL Orchestrator
Getting started with automation - Red Hat Summit 2024
zhlédnutí 103Před měsícem
Getting started with automation - Red Hat Summit 2024
Automation with AI tools - Red Hat Summit 2024
zhlédnutí 107Před měsícem
Automation with AI tools - Red Hat Summit 2024
All about F5 Ingress Link - Red Hat Summit 2024
zhlédnutí 77Před měsícem
All about F5 Ingress Link - Red Hat Summit 2024
RSA Conference 2024 Wrap Up - AI, APIs And Quantum Crypto
zhlédnutí 120Před měsícem
RSA Conference 2024 Wrap Up - AI, APIs And Quantum Crypto
Explore AS3 updates for BIG-IP Next - Red Hat Summit 2024
zhlédnutí 114Před měsícem
Explore AS3 updates for BIG-IP Next - Red Hat Summit 2024

Komentáře

  • @mmkh3674
    @mmkh3674 Před dnem

    You actually HAVE some control over anycast BGP routing, specially using BGP communities (path prepending, local pref, etc.)

  • @hysteria648
    @hysteria648 Před 4 dny

    7 years later and still slaps

  • @Views46m
    @Views46m Před 6 dny

    Hii

  • @sarvo-tha-man
    @sarvo-tha-man Před 7 dny

    is there some detailed documentation available of JFrog Curation

  • @chaitanyakunda8583
    @chaitanyakunda8583 Před 11 dny

    where do I find the math for all these cipher suits for tls 1.3?

  • @prestongoodwin1070
    @prestongoodwin1070 Před 12 dny

    Your lessons help me become more successful in trading. Thank you very much for your time and effort!🚳

  • @user-zq9yn6do6s
    @user-zq9yn6do6s Před 12 dny

    Thanks for the update and keep doing what you do. crypto world keeps fluctuating in prices perhaps huge profits is been made by experts. This is very good multifunctional exchange

    • @666aa-vz9hl
      @666aa-vz9hl Před 9 dny

      Всегда приятно видеть, как работают проверенные методы, спасибо за них!

  • @martinivanov3739
    @martinivanov3739 Před 12 dny

    Well, i did everithing necesery to get a free trial license, yet week later is still on hold for reason uknown

  • @lesliehubertus3207
    @lesliehubertus3207 Před 13 dny

    Public speaking, mycelium, music, meeting people where they are, AI-generating All The Things not being a best practice, practitioner-to-practioner vs marketer/salescritter-to-practitioner... I love this chat!

    • @aubreyking3685
      @aubreyking3685 Před 12 dny

      Me too! I find that talking with Akira helps me think about things in new ways.

  • @jann9507
    @jann9507 Před 18 dny

    Dragged out a single concept : User - Identity provider - saml - Service provider Dumbed down version

  • @amosgiture
    @amosgiture Před 18 dny

    I expected a demo showing how the operator is used to configure the Big-IP but you chose to dwell on repos...isn't the docker repo also maintained by F5????

  • @vinitbhardwaj8403
    @vinitbhardwaj8403 Před 18 dny

    Perfectly Explained. The puzzle is solved now. Kinda.

  • @DesignsbyBlanc
    @DesignsbyBlanc Před 20 dny

    I’m sad I can’t win a pair 😢

  • @MyJoyInTheAir
    @MyJoyInTheAir Před 21 dnem

    Thanks for a good explanation.

  • @fuzzywzhe
    @fuzzywzhe Před 28 dny

    What would be SUPER useful in my opinion is show that if G is the generator point demonstrate that 1G + 2G + 8G = 11G - becuase it's the commutative property that MUST be used to do multiplication, right? If it is, I think people will see why point multiplication is so easy, but point division is basically so difficult. In the example I gave, 11 would be the secret key, wouldn't it? You know the final point, but you don't know what the original number was for scalar multiplication. This was my difficulty in understanding this.

  • @leworkdagne7689
    @leworkdagne7689 Před 28 dny

    Very important video but we need more practical real examples

  • @ThelmaBalbuena
    @ThelmaBalbuena Před měsícem

    this is extremely well explained, thanks

  • @JoshBecigneul
    @JoshBecigneul Před měsícem

    Will the report findings be able to automatically inform updates to the WAF policy, if it's in use?

  • @Range13-kw7ij
    @Range13-kw7ij Před měsícem

    Is it Gateway Controller ?

  • @Range13-kw7ij
    @Range13-kw7ij Před měsícem

    is it gateway controller ?

  • @user-lh3um1nh3t
    @user-lh3um1nh3t Před měsícem

    Hi, F5 DevCentral team. I have a copyright question. Since the information in this video is covered by the Creative Commons License 3.0, is this video, by nature, available to re-use in educational material my company distributes? I've been trying to find good video content covering OWASP Top 10 (instead of making it in-house) and came across your videos. I would like to know if we can redistribute your CZcams series as part of our product?

    • @JasonRahm
      @JasonRahm Před měsícem

      You can use the OWASP videos in your training…we only ask that you give proper attribution to F5/DevCentral so that the viewers will know who made these videos.

    • @TMLaDesign
      @TMLaDesign Před měsícem

      Absolutely, we will give attribution and link to the original video to follow the Creative Commons license - thank you!

  • @mattmabis1751
    @mattmabis1751 Před měsícem

    Thanks Jason and DevCentral Channel for letting me talk about my Automation Journey, it fun to just sit and talk!

  • @mario.caseiro
    @mario.caseiro Před měsícem

    Guys have you think in embedding drools to risckV?

  • @mohammedyaseerpasha7909
    @mohammedyaseerpasha7909 Před měsícem

    Ty

  • @sharptruth4132
    @sharptruth4132 Před měsícem

    how do you shoot that drawing on our screen? i need tutorial

  • @CyberJuke5
    @CyberJuke5 Před měsícem

    So a ZSK is the same thing as a DNSKEY?

  • @kesdunu937
    @kesdunu937 Před měsícem

    Good God, have some respect for yourself.

  • @raghav151196
    @raghav151196 Před měsícem

    Just thinking about the last part of the video, where you mentioned that "LIMIT" could be used to curtail the attack so that not all data is leaked. Just wondering if the attacker could just comment out the latter part of the query, and then "LIMIT" becomes useless.

  • @mohammedyaseerpasha7909
    @mohammedyaseerpasha7909 Před měsícem

    one of the best explanations so far. Thanks, Man.

  • @JayEhEy
    @JayEhEy Před měsícem

    It can do all that, and more, I have been plagued with it for three months now.

  • @JoshBecigneul
    @JoshBecigneul Před měsícem

    If you do this long enough, everyone could have a 10.x deployment hiding somewhere 😄

  • @KennethBennett0
    @KennethBennett0 Před měsícem

    Thanks again. Please don't ever stop doing these for us! :)

  • @kmo1313
    @kmo1313 Před měsícem

    Can’t wait to try this! Very cool 🎉

  • @giovanarossipasquareli63
    @giovanarossipasquareli63 Před měsícem

    I couldn't find the article. What is the name? HELP

  • @BeNetCoders
    @BeNetCoders Před měsícem

    Nice work... Just a tip for your comments that you type in the command line.. You can put a # symbol at the start of the line and press enter.... This will ignore the whole line, (on Ubuntu..) i assume other NX distro`s it`s the same..

  • @razitouch
    @razitouch Před měsícem

    We are looking into this deployment and local F5 SE are not much familiar with this openshift integration

  • @razitouch
    @razitouch Před měsícem

    Is F5 going to come up with a reference architecture for this new way of deploying F5 on a virtual infrastructure

  • @rchintha
    @rchintha Před měsícem

    Thanks for sharing. This is super helpful.

  • @ahmedabdelnaser2134
    @ahmedabdelnaser2134 Před měsícem

    Is there any way to change the interface or add new interface to the PIPELINE ?

  • @linuxbrad
    @linuxbrad Před měsícem

    Why does the target have to deencapsulate packets from many sources when it should already know it's real endpoints and have them white-listed. In other words all the gre flood shouldn't even get past the firewall

  • @danish6192
    @danish6192 Před měsícem

    1. the tcp handshake still occurs 2. certificate verification also happens

  • @ellinikos6281
    @ellinikos6281 Před měsícem

    4:50 He detached from reality and literally dreamed of a curve while saying "So we are gonna draw an elliptic curve on this graph" haha

  • @jordanaldrich
    @jordanaldrich Před měsícem

    Great vid, thank you!

  • @TimRiker
    @TimRiker Před měsícem

    Didn't realize you were from Rochester. I am too. :)

  • @DomingosVarela
    @DomingosVarela Před měsícem

    Hi, Can i do a HA with L3 link over the wan? Where each bigip in a different location, active and standby site? Thanks

  • @J-thor08
    @J-thor08 Před měsícem

    how are you writing inverted ?? it just continiously mess with my brain

  • @TimRiker
    @TimRiker Před měsícem

    Question for the roundtable, TLS 1.3 is not enabled in BIG-IP by default, and many ciphers that are not needed are enabled. Does the team think this will change and when? Note: even BIG-IP Next has TLS 1.3 disabled by default.

    • @devcentral
      @devcentral Před měsícem

      The roundtable wouldn't typically answer that sort of question in an episode, as it's about a product, not application security, but I will try to follow up on that.

    • @devcentral
      @devcentral Před měsícem

      I'm told these are set for FIPS and Common Criteria and we should be changing in the 20.3-ish timeframe. This is not to say that 1.3 will be set by default, but we will conform to standard again at that time.

    • @devcentral
      @devcentral Před měsícem

      Following up on Next. It *IS* default, now. If you're not seeing it immediately, it should be next release, but I was shown the screen shot on a fresh system.

    • @TimRiker
      @TimRiker Před měsícem

      @@devcentral Nice! I'll have a look. I wonder what the default cipher group string is. We use this one: DEFAULT:!TLSv1:!TLSv1_1:!RSA:!DHE:!SHA1:@STRENGTH

  • @TimRiker
    @TimRiker Před měsícem

    Does this mean all the focus will be on security no? I'd like to see some other DevCentral focus. What happened to the BigIPReport brief we filmed?

    • @devcentral
      @devcentral Před měsícem

      AppSec Monthly focuses on the AppSec, not products. There are still many pieces of content from AppWorld that have not made it to the channel yet.

  • @shamelessone1987
    @shamelessone1987 Před měsícem

    I regret wanting to know this information, I watched several videos on the basics of assymetric encryption for a course and everyone of them just uses the "locked mailbox " analogy but I just needed to know or else I wouldnt be able to move past it... I now know enough to know that I should have been happy with the mailbox analogy lol

  • @sandeshbhalerao2909
    @sandeshbhalerao2909 Před měsícem

    F5 Team, Hope you will address it Please improve your F5 support first.. As I'm working with f5 product in my organization.. It's worst TAC support as compare to other technologies TAC support..