Should Vegas get SASE?
Could Secure Access Secure Edge remote access help Las Vegas extend it’s experience into locked-down living rooms?
Life between the lines
Links / Observations / Security Strategy / Too long for Twitter
by Sujeet · Published January 18, 2016
In this 4-minute clip, Ari Kaplan talks about some observations and views regarding the perception of corporate data, about people being the key factor in creating a good enterprise security posture and about ownership...
Industry participation / Observations / Security Strategy / The Insecure Post
by Sujeet · Published January 17, 2016
Hanesbrands Inc. (umbrella firm for various brands including L’eggs, Playtex, Wonderbra, Champion, and Maidenform) stated on Wednesday – June 29, 2015; that a customer order database was breached by a hacker in June 2015, compromising information for about 900,000 online and telephone customers. Yours truly was a customer at that time, and was a part of the folks notified by Hanes.
Observations / Status / Too long for Twitter
by Sujeet · Published July 28, 2015 · Last modified July 29, 2015
Security researcher Sijmen Ruwhof has publicly disclosed a security vulnerability in a PHP file manager used by the likes of Nestle, Siemens, Loreal, 3M, Hilton, T-Mobile and Nintendo; to manage confidential content. The disclosure talks about this content being accessible. The vendor has not responded; but, as of July 29, the Siemens Social Media Team has responded via social media.
Observations / Security Strategy / Status / Too long for Twitter
by Sujeet · Published July 26, 2015 · Last modified July 27, 2015
The July 23 shooting in a movie theater at Lafayette, Louisiana. This article looks at advances in imaging technology and the established example of the Transportation Security Administration to manage high-traffic areas with a view of establishing a security baseline without impacting the user experience.
More
Chief Information Security Officer at 7-Eleven. C|CISO, CCSK, CISM & CGEIT.
I build security excellence into the culture & brand by helping organizations grow trust with its customers, partners, employees & stakeholders.
Please feel free to reach me at sujeet@bambawale.com
Security vulnerability in the Cisco Adaptive Security Appliance
January 17, 2016
Links / Security Strategy / Too long for Twitter
Security tops CIO worries: CSO Online
September 15, 2014
M | T | W | T | F | S | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | ||||
4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 | 16 | 17 |
18 | 19 | 20 | 21 | 22 | 23 | 24 |
25 | 26 | 27 | 28 | 29 | 30 | 31 |
Cloud / Industry participation / Too long for Twitter
The Cloud Native Computing Foundation
January 21, 2016
Vox Populi