For all ye secret agents in suburbia…
A three-SIM Motorola cellphone on sale at Groupon for $40…and me trying to be funny about potential use cases that one would buy it for.
Life between the lines
It seems like the ultimate paradox. Social media is where one shares. Security is for what one doesn’t want to share. Could the two ever meet? They can, they do and they make a great partnership. This post details the various opportunities that social media can help with regarding organizations building security into their brand.
by Sujeet · Published September 8, 2014 · Last modified September 15, 2014
..we (Satoshi Nakamoto, to be precise) invented a method of payment that enjoyed the same anonymity and acceptance of physical currency transactions in the real world, along with a similar level of value volatility...
More
Chief Information Security Officer at 7-Eleven. C|CISO, CCSK, CISM & CGEIT.
I build security excellence into the culture & brand by helping organizations grow trust with its customers, partners, employees & stakeholders.
Please feel free to reach me at sujeet@bambawale.com
Security vulnerability in the Cisco Adaptive Security Appliance
January 17, 2016
Links / Security Strategy / Too long for Twitter
Security tops CIO worries: CSO Online
September 15, 2014
M | T | W | T | F | S | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
6 | 7 | 8 | 9 | 10 | 11 | 12 |
13 | 14 | 15 | 16 | 17 | 18 | 19 |
20 | 21 | 22 | 23 | 24 | 25 | 26 |
27 | 28 | 29 | 30 | 31 |
Cloud / Industry participation / Too long for Twitter
The Cloud Native Computing Foundation
January 21, 2016
Vox Populi