Chris Templeton

In the rapidly evolving world of network infrastructure, staying current is not just a best practice—it’s a necessity. For F5 users, this means keeping your BIG-IP systems up to date with the latest supported versions. You can find out if you're due for a an upgrade with our bespoke F5 Software Countdown!
The IT and Cyber Security landscape has undergone significant changes in recent years. One prominent change is Citrix shifting their focus from the load-balancing space to more towards other areas, as evidenced by acquisitions like Wrike, a project management company, and the end-of-sale announcement for NetScaler Perpetual Licenses.
Certificate management is a critical part of an organisation’s cyber security that cannot be ignored. Certificates are vital for protecting data transmitted between websites and users. If not properly managed, data could be at significant risk. One certificate option that organisations often consider is wildcard certificates, which provide some benefits but also carry security risks.
The debate has been raging for years. Which is the superior application delivery controller (ADC), F5 BIG-IP or Citrix NetScaler?
Certificate management has become a higher profile challenge recently thanks to Google’s well publicised intention to reduce certificate lifespans, acceptable for use in its popular browser Chrome, to a maximum of 90 days.
Google's announcement to reduce the lifespan of Transport Layer Security (TLS) certificates from 398 days to 90 days continues to be a hot topic of discussion among information security professionals, especially those directly involved in replacing and updating certificates. It’s especially frustrating because – although mooted back in April of 2023 – there’s still no confirmed date for its implementation. Yet Chrome browsers account for just over 50% of all UK web traffic (Statista), so there’s no avoiding the impact that this will have.
As cyber-attacks become more sophisticated, the security framework of Zero Trust should be at the forefront of everyone’s mind, especially when protecting sensitive data.
Businesses depend greatly on their online presence and digital services. The threat of distributed denial-of-service (DDoS) attacks is more significant than ever. These malicious attacks can quickly cripple your website, applications, and network infrastructure, leading to devastating consequences for your business operations, revenue, and reputation. It's crucial for organisations to continually improve their security measures.
Many organisations are still relying on legacy software which can have a major impact on cyber security and can affect the performance and productivity of an infrastructure which can result in significant cyber risks. So, what are the issues an organisation can face with outdated legacy software?