Featured
Shift Left: Transform Your API Security with F5 and Google Cloud
David Remington Director of Product Management F5 | Joshua Haslett Strategic Technology Partner Manager Google Cloud
Are shadow APIs lurking in your environment? While 41% of organizations now manage at least as many APIs as they do applications*, the true number may be much higher due to unmanaged shadow APIs. As organizations start to build intelligent, AI-enabled applications, the need for APIs and better API security increases.
To mitigate the risk of shadow APIs, security must shift left. This requires a better understanding of the attack surface and threat landscape. It also needs the right tools to span developers and security teams to implement protections that don’t impact the speed of development.
Join this webinar to learn how F5 and Google Cloud can improve your API security posture through improved discovery, governance, and security. This expert session will include how to integrate API security with your CI/CD pipeline, find shadow APIs in your environment, and block malicious requests in order become more secure.
All episodes
-
Bots to Board Room: The Often-Missed Economic Impact of Bots
Jim Downey, Cybersecurity Evangelist at F5 | Joshua Haslett, Strategic Technology Partner Manager at Google Cloud
While security and operations teams care deeply about their ability to deliver the best experience possible for their customers while enhancing operational efficiencies, there is plenty left for the board and the executive staff to consider when it comes to bots and automated attacks.
Join Joshua Haslett, Strategic Technology Partner Manager at Google Cloud, and Jim Downey, Cybersecurity Evangelist at F5, for an in-depth conversation to help crack the code on “bot economics” so you can learn how to:
• Calculate financial revenue and reputation costs
• Identify and control operational expenses
• Develop a cost/benefit analysis for bot mitigation
• Prepare for that much-needed business conversation with key stakeholdersF5 Distributed Cloud Bot Defense for Google Cloud enables frictionless security that complements performance, automation, and insight to deliver and scale the application experience. Join the conversation to determine the economic impact of bots on your business so you can demonstrate to the board that the top and bottom lines are safe from bot-generated compromise.
-
Stop Bad Actors From Attacking Your Mobile Apps
FEATURING Peter Zavlaris Cyber Security Evangelist, F5 | Joshua Haslett Strategic Technology Partner Manager, Google Cloud
Attackers will repackage mobile apps, inject malware, hooking frameworks, and perform overlay attacks to cause security breaches, data leaks, and gain privileged access. Once a mobile app is controlled or hijacked, attackers can attack your server-side applications using automated attacks. They will also steal sensitive data that resides in your mobile apps, such as customer credentials, API keys, and intellectual property. You are on the hook for rigorous compliance standards for privacy (ex: GDPR, CCPA), payments (ex: EMVCo SBMP, PCI, & PSD2), and health records (HIPAA).
Part of picking the right infrastructure is knowing you can extend secure experiences to mobile applications. With intellectual property and sensitive information flowing through these mobile apps, it’s important to understand the risk and what you can do to make this a safe channel for your business.
You’ll also learn more about F5’s new mobile app security solution which can help you reduce security risk and meet compliance. Join the conversation and see how mobile application security can be a bigger part of your secure application vision.
-
Thwart the Account Takeover Menace – Join the API Security Conversation
Angel Grant, Vice President of Security, F5 | Joshua Haslett, Strategic Technology Partner Manager Google Cloud
APIs have become one of cybercriminals’ favorite vectors for account takeover attacks. Credential stuffing, business logic abuse, and DDoS attacks are just some of the malicious automated bot attacks deployed to take over accounts and perpetrate identity theft and fraud.
Readily available scripts and tools make orchestrating API attacks easier than ever, and legacy bot defense techniques struggle to detect these potentially devastating incursions. Thus, it’s no surprise that, according to recent Google Cloud research, 50% of organizations experienced an API security incident in the past 12 months.
With such a dire threat via APIs negatively impacting user data and the bottom line, F5 and Google Cloud are hosting a panel discussion to answer your pressing questions about API security and tactics.
Join the conversation to hear F5’s Vice President, Security, Angel Grant’s answers to hard-hitting questions about account takeover attacks and API security.
Join the webinar to see Angel on the API security hot seat and learn:
- What’s the current threat landscape targeting APIs
- How exploits in API business logic can lead to fraud
- Defense tactics against API injections
- How to mitigate potential brand and reputational damage
- Why legacy bot detection techniques have become ineffective
- How to best decern between good and bad traffic – both human and botLearn more, register today
-
Untangling APIs: Addressing Sprawl and Securing Your Digital Ecosystem
Ian Dinno,Sr. Manager, F5 | David Remington, F5 | Joshua Haslett, ]Strategic, Technology Partner Mgr Google Cloud
As organizations increasingly adopt hybrid architectures and microservices, the number of APIs utilized within their ecosystems continues to grow at an exponential rate. This phenomenon, known as API sprawl, poses significant challenges in terms of security, governance, and efficiency. But of them all, API security might require the most urgent response.
For organizations trying to secure their APIs, multi-cloud complexity and difficulty enforcing consistent security top the list of challenges according to F5’s State of Application Strategy Report (2023). To address API sprawl, organizations need to adopt a more holistic app and API security strategy for their organization including components that deliver runtime protection, posture management, and help integrate security and code testing earlier in the software development lifecycle.
Join the conversation to hear Joshua Haslett, Ian Dinno, and David Remington's answers to hard-hitting questions about API sprawl, management and security.
-
Keys to Making Distributed, Multi-Cloud App Environments Easier to Manage
Joshua Haslett, Strategic Technology Partner Mgr. Google Cloud | Ian Dinno, F5 | Rahul Phadke, F5
Most organizations today have apps and APIs deployed across multiple different architectures as choosing the right environment for each application —a specific public cloud, edge location, and/or on-premises data center— is important to best serve the needs of the business. However, that flexibility comes at a high price: managing complex, disparate environments, significantly increased operational complexity and cost, loss of end-to-end visibility into the health and performance of digital services, and an exponentially expanding surface area for potential cyberattacks. These distributed environments represent a new normal, so it’s critical to mitigate the operational complexity that accompanies them.
Join the conversation to hear answers to hard-hitting questions about making distributed environments easier to connect, manage and secure.
Join the webinar to learn:
- What is secure multi-cloud networking?
- How are organizations doing this today?
- What issues does this current approach create?
- How to deliver and connect apps across disparate environments seamlessly and securely
- How to ensure intent based access and protection for your distributed appsLearn more, register today
-
Secure and Accelerate Multi-Cloud Success with F5, Google Cloud, and Intel
F5, Google Cloud, and Intel
The reality of hybrid and multi-cloud makes it challenging to create consistent security management and policies across your IT landscape. As you accelerate your cloud journey and move business critical workloads into Google Cloud to take advantage of its open frameworks, Kubernetes platform and services, and AI and ML capabilities, consider a two-pronged security approach: leveraging the inherent zero-trust nature and security features of Google Cloud for volume coverage, and complementing those defenses with F5 solutions to target more sophisticated threats.
Join Matthew Emes, Senior Solutions Architect at F5, and Cyrus Rafii, Sr Business Development Manager at F5, to discuss how F5 and Google Cloud security solutions can work together to protect your journey and accelerate cloud adoption.
We’ll also discuss the benefits of adding Intel QuickAssist Technology running on Google Cloud to your security strategy, to offload encryption processing and ensure performance for your applications.
-
The Benefits and Security Considerations of Moving Healthcare EHR to Cloud
Joshua Haslett, Strategic Technology Partner Mgr.Google Cloud | Lauren Wood, Lauren Wood Business Development Manager, F5
As public cloud becomes mainstream for sensitive applications and data, the healthcare industry is cautiously evaluating cloud for electronic health records to achieve resiliency, democratized access at scale, and close proximity to innovative AI and analytics services. But what concerns should organizations have when it comes to securing sensitive patient and proprietary research data in the cloud?
Google Cloud has made great strides in providing secure infrastructure and services designed with healthcare industry requirements in mind and is building on its success with its Healthcare API and partnerships with F5 and Epic. Learn what a secure EHR journey to cloud can look like with F5, Google Cloud, and Epic.
-
It Takes a Village to Secure Your Business With F5, Google Cloud, and WWT
Joshua Haslett, StrategicTechnology Partner Google Cloud | Mistie Hughes-Garza,, F5 |Joshua Bushman, PracticeL ead,WWT
Hybrid and multi-cloud complexity have made securing your applications more difficult than ever. With so many options, IT and security teams often find themselves with more tools than they can manage across their environments. Hear how Google Cloud is designing their marketplace to reduce complexity and streamline security and performance.
F5, Google Cloud, and WWT have come together to simplify the security journey from procurement to management. Learn how a Google Cloud Marketplace is making it easier to work with your trusted advisors to simplify time to deployment with the right set of ecosystem partners.
-
Protect AI: Securing Your Modern Multicloud Apps with F5 and Google Cloud .
Gary Newe - VP Global Solution Architect, F5 | Joshua Haslett, Strategic Technology Partner Mgr Google Cloud
The rapid evolution of AI is allowing developers to create the next generation of powerful apps and user experiences. Google Cloud makes that possible through the new Gemini family of AI models that offer enterprise-ready AI capabilities. But even the most advanced AI-powered apps need protection against cyberthreats, especially with a vast multicloud attack surface.
Join this webinar to learn how F5 and Google Cloud are using AI to accelerate app modernization and security. Uncover how to solve your app challenges in a multicloud world, including protecting the APIs that power your AI apps, defending against automated attacks, and connecting clouds, apps, and microservices anywhere.
-
Shift Left: Transform Your API Security with F5 and Google Cloud
David Remington Director of Product Management F5 | Joshua Haslett Strategic Technology Partner Manager Google Cloud
Are shadow APIs lurking in your environment? While 41% of organizations now manage at least as many APIs as they do applications*, the true number may be much higher due to unmanaged shadow APIs. As organizations start to build intelligent, AI-enabled applications, the need for APIs and better API security increases.
To mitigate the risk of shadow APIs, security must shift left. This requires a better understanding of the attack surface and threat landscape. It also needs the right tools to span developers and security teams to implement protections that don’t impact the speed of development.
Join this webinar to learn how F5 and Google Cloud can improve your API security posture through improved discovery, governance, and security. This expert session will include how to integrate API security with your CI/CD pipeline, find shadow APIs in your environment, and block malicious requests in order become more secure.