CONTRIBUTOR MIKE CONVERTINO

blog / Feb 28, 2017 (MODIFIED: Mrz 24, 2017)

A CISO’s Reflections on RSA 2017

Recapping RSA 2017: Endpoint Protection, Threat Hunting, and Talent Searching Abound!

article / Jan 18, 2017 (MODIFIED: Mrz 06, 2017)

Welcome to CISO to CISO

Hi. I’m Mike Convertino, CISO of F5 Networks, and I want to welcome you to an experiment we’re conducting here at F5. We’ve laid the foundation of this CISO to CISO portal on an idea that has traditionally been somewhat controversial in the security community: openness.

blog / Jan 18, 2017 (MODIFIED: Mrz 13, 2017)

Application Threat Intelligence: What Do CISOs Need?

I’ve mentioned before how important strong risk management is to a CISO. When it comes to risk, the applications our users depend on are a big concern. In F5's 2016 State of Application Security survey, a majority of respondents cited security around applications as an area of great concern.

article / Aug 24, 2016 (MODIFIED: Feb 24, 2017)

When Securing Your Applications, Seeing Is Believing

While the cloud is amazing, a worrying lack of visibility goes along with it. F5 CISO Mike Convertino on things to keep in mind when developing a security approach.  When Securing Your Applications, Seeing is Believing

article / Jun 21, 2016 (MODIFIED: Feb 24, 2017)

Privacy and Security: Where Do We Go From Here?

Some of you may remember a time when national security was a question of police officers protecting individuals from crime on the street, or the Army’s defence against international threats. Today, that picture looks very different. If anything,...

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.