Strategies

When Securing Your Applications, Seeing Is Believing

F5 CISO Mike Convertino on things to keep in mind when developing a security approach to overcome the lack of visibility in the cloud. When Securing Your Applications, Seeing is Believing
August 24, 2016
1 min. read

 

Like many of my peers, I marvel at the amazing ways the cloud has changed our lives and how we work. At the same time, I’ve lost untold hours of sleep worrying about the security risks this transformation creates. As a CISO, I spend a big chunk of every day planning for, evaluating, and responding to different types of threats to our network and applications. But that’s not what keeps me up at night—it’s the areas of exposure and lack of visibility that I know exist and yet have a limited ability to address. Basically, the things that don’t go bump in the night.

While the cloud is amazing, a worrying lack of visibility goes along with it. I've written about things to keep in mind when developing a security approach, over on Dark Reading.

Dark Reading: When Securing Your Applications, Seeing is Believing

Join the Discussion
Authors & Contributors
Mike Convertino (Author)
Head of Technology

More from Learning Center

Forward and Reverse Shells
Forward and Reverse Shells
09/15/2023 article 5 min. read
Web Shells: Understanding Attackers’ Tools and Techniques
Web Shells: Understanding Attackers’ Tools and Techniques
07/06/2023 article 6 min. read
What Is Zero Trust Architecture (ZTA)?
What Is Zero Trust Architecture (ZTA)?
07/05/2022 article 13 min. read