Discover
Matt Thiffault's Security Articles read for your audio consumption
11 Episodes
Reverse
Cybersecurity Predictions for 2022 from F5 Labs (and Friend) F5 Labs https://bit.ly/3rOhySJ Opening Last Summer by Ikson: http://www.soundcloud.com/ikson Music promoted by Audio Library https://youtu.be/n2oTA5JSk8
When will we get rid of passwords. By: Shuman Ghosemajumder and Taggart Bonham https://www.f5.com/labs/articles/cisotociso/when-will-we-get-rid-of-passwords-
They don't work... but what will and why not now?
Intro music Last Summer by Ikson: http://www.soundcloud.com/ikson
Episode 9 Credential Stuffing Tools and Techniques
By John Miller https://www.f5.com/labs/articles/threat-intelligence/credential-stuffing-tools-and-techniques-part-1
Opening Last Summer by Ikson: //www.soundcloud.com/ikson Music promoted by Audio Library youtu.be/n2oTA5JSk8
What is Credential Stuffing
https://www.f5.com/labs/articles/education/what-is-credential-stuffing-
Opening Last Summer by Ikson: http://www.soundcloud.com/ikson Music promoted by Audio Library https://youtu.be/n2oTA5JSk80
How_Cyber_Attacks_Changed_During_the_Pandemic_
By Raymond Pompon
https://www.f5.com/labs/articles/threat-intelligence/how-cyber-attacks-changed-during-the-pandemic
Authentication Incidents: 2020 Application Protection Report, Volume 2
https://www.f5.com/labs/articles/threat-intelligence/api-authentication-incidents-2020-apr-vol2
F5 Labs Article
https://www.f5.com/labs/articles/bylines/the-new-kid-on-the-cyber-block--data-manipulation
BW CIO World
http://bwcio.businessworld.in/article/The-New-Kid-On-The-Cyber-Block-Data-Manipulation-/10-06-2020-286064/
We are Entering a New World of “Adaptive Applications.” Here’s What that Means.
KARA SPRAGUE
PUBLISHED AUGUST 11, 2020
https://www.f5.com/company/blog/adaptive-applications
2020 APR, Volume 1: APIs, Architecture, and Making Sense of the Moment
https://www.f5.com/labs/articles/threat-intelligence/2020-apr-vol1-apis-architecture
Last Summer by Ikson: http://www.soundcloud.com/ikson Music promoted by Audio Library https://youtu.be/n2oTA5JSk80
Making the Most of a Security Incident
Difficult security incidents are unique and valuable opportunities. They are the sort of testing you can’t buy: real-world, un-simulated, and direct. They are priceless jewels, but only if you use them for all they’re worth.
https://www.f5.com/labs/articles/cisotociso/making-the-most-of-a-security-incident
What APIs are and why it’s important to understand the role they play as building blocks of modern applications. In part two, we discuss the security implications of APIs and how to protect them.
https://www.f5.com/labs/articles/education/still-mystified-by-apis-what-they-are-really-and-why-they-matter



