Maurice McMullin

Maurice McMullin is a Principal Product Marketing Manager in Kemp with too many years of experience in the development and marketing of networking and security products. He has worked in organizations of all sizes ranging from two person startups through to multinationals in roles as varied as programmer and CTO.

How the cloud is changing Application Delivery

The State of Application Experience [AX] 2019 Report from Kemp has highlighted some interesting points on how the move to cloud is changing the way applications are delivered. Moving to …

November 19, 2019

F5 Migrate KEMP

KEMP Rules Migration for Legacy F5 LTM Local Traffic Manager with iRules

Introduction Migrations are time-consuming and carry a level of risk. The risks are even higher when you have to migrate from one vendor to another. Such migration often requires multiple …

August 7, 2018

OWASP 2017 – A1 Injection

Injection attack remains at the A1 position on the latest 2017 OWASP Top 10 list of most prevalent security threats for web-based applications. It is straightforward to exploit on systems …

June 6, 2018

Differences Between Legacy Application Delivery and Application Delivery Fabric

The way applications are developed and delivered is rapidly changing. The adoption of Agile methodology, DevOps practices, and multi-cloud hybrid platform delivery means that the load balancing infrastructure practices of …

February 14, 2018

OWASP 2017 A10 – Underprotected APIs

A10 – Underprotected APIs is one of two new additions to the OWASP Top 10 list of threats to web applications. The other new addition is A7 – Insufficient Attack …

September 11, 2017

Kemp Default Blog Image

SDN and NFV – Better Together

Software Defined Networking (SDN) and Network Function Virtualization (NFV) are significant and exciting developments in the field of computer networking. They are great individually, but when deployed together with automation …

July 25, 2017

DNS, Load Balancing and DDOS attacks

Throughout history, civilizations have suffered from a false sense of security. One of the most famous incidents occurred during the war between Greece and Troy. The Trojans felt so confident …

November 3, 2016

Kemp Default Blog Image

Using a WAF to help Deliver PCI DSS

If an organization wants to take credit card payments over the Internet then it has to implement the Payment Card Industry Data Security Standard. This standard is generally known via …

November 2, 2016

Top 15 Tips to Increase Exchange Security

Email is an essential business enabler in most organizations. Emails are also considered as legal transactions just like any other document created and circulated by a company. It is therefore …

June 28, 2016

Kemp Default Blog Image

Top 15 consideration before deploying Skype for Business Server 2015 in your Environment

Skype for Business has replaced Lync Server 2013 in Microsoft’s messaging portfolio. It combines the features from the previous release of Skype and Lync Server to deliver a premier component …

February 15, 2016

OWASP Top Ten Series: Missing Function Level Access Control

Missing Function Level Access Control What is the vulnerability? Web applications typically only show functionality that a user has the need for and rights to use in the UI on …

December 9, 2015


OWASP Top Ten Series: Cross Site Scripting

Cross Site Scripting (XSS) attacks are a type of injection attack. XSS is probably the most common type of malicious attack after code injection. They are certainly the most common …

October 13, 2015