Wednesday, February 20, 2019

F5 Labs: Nine Types of Meetings Every CISO Should Master

Nine Types of Meetings Every CISO Should Master 

 https://www.f5.com/labs/articles/cisotociso/nine-types-of-meetings-every-ciso-should-master

F5 Labs: Reviewing Recent API Security Incidents

Reviewing Recent API Security Incidents 

 https://www.f5.com/labs/articles/threat-intelligence/reviewing-recent-api-security-incidents

F5 Labs: The DNS Attacks We’re Still Seeing

The DNS Attacks We’re Still Seeing

https://www.f5.com/labs/articles/threat-intelligence/the-dns-attacks-we-re-still-seeing

F5 Labs: If I Had It to Do Over Again—Part 2

If I Had It to Do Over Again—Part 2

https://www.f5.com/labs/articles/cisotociso/if-i-had-it-to-do-over-again-part-2

 

F5 Labs: If I had to do it over again

If I Had It to Do Over Again

 https://www.f5.com/labs/articles/cisotociso/if-i-had-it-to-do-over-again

F5 Labs: Governing Security at Large Enterprises

Governing Security at Large Enterprises 

 https://www.f5.com/labs/articles/cisotociso/governing-security-at-large-enterprises

Helpnet Security: Shifting the burden: Long-term magnifying consequences

Shifting the burden: Long-term magnifying consequences

 https://www.helpnetsecurity.com/2019/01/07/shifting-the-burden/

F5 Labs: From the Dojo to the SOC

From the Dojo to the SOC 

 

F5 Labs: Information Security Awareness Training, Reimagined

Information Security Awareness Training, Reimagined 

 

https://www.f5.com/labs/articles/cisotociso/information-security-awareness-training--reimagined