CONTRIBUTOR MIKE CONVERTINO

blog / 2 28, 2017

A CISO’s Reflections on RSA 2017

Recapping RSA 2017: Endpoint Protection, Threat Hunting, and Talent Searching Abound!

article / 1 18, 2017 (MODIFIED: 3 06, 2017)

Welcome to CISO to CISO

Hi. I’m Mike Convertino, CISO of F5 Networks, and I want to welcome you to an experiment we’re conducting here at F5. We’ve laid the foundation of this CISO to CISO portal on an idea that has traditionally been somewhat controversial in the security community: openness.

blog / 1 18, 2017 (MODIFIED: 3 13, 2017)

Application Threat Intelligence: What Do CISOs Need?

I’ve mentioned before how important strong risk management is to a CISO. When it comes to risk, the applications our users depend on are a big concern. In F5's 2016 State of Application Security survey, a majority of respondents cited security around applications as an area of great concern.

article / 8 24, 2016 (MODIFIED: 2 24, 2017)

When Securing Your Applications, Seeing Is Believing

While the cloud is amazing, a worrying lack of visibility goes along with it. F5 CISO Mike Convertino on things to keep in mind when developing a security approach.  When Securing Your Applications, Seeing is Believing

article / 6 21, 2016 (MODIFIED: 2 24, 2017)

Privacy and Security: Where Do We Go From Here?

Some of you may remember a time when national security was a question of police officers protecting individuals from crime on the street, or the Army’s defence against international threats. Today, that picture looks very different. If anything,...

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.