Should Vegas get SASE?
Could Secure Access Secure Edge remote access help Las Vegas extend it’s experience into locked-down living rooms?
Life between the lines
Cloud / Industry participation / Status
by Sujeet · Published January 31, 2016 · Last modified February 11, 2016
Industry participation / Observations / Security Strategy / The Insecure Post
by Sujeet · Published January 17, 2016
Hanesbrands Inc. (umbrella firm for various brands including L’eggs, Playtex, Wonderbra, Champion, and Maidenform) stated on Wednesday – June 29, 2015; that a customer order database was breached by a hacker in June 2015, compromising information for about 900,000 online and telephone customers. Yours truly was a customer at that time, and was a part of the folks notified by Hanes.
Observations / Security Strategy / Status / Too long for Twitter
by Sujeet · Published July 26, 2015 · Last modified July 27, 2015
Observations / Security Strategy
by Sujeet · Published July 18, 2015 · Last modified February 22, 2016
martinak15 / Foter / CC BY In April 2010, the National Institute of Standards and Technology published a set of recommendations as a guide for protecting the confidentiality of Personally Identifiable Information [PDF]. Co-authored...
The Cloud Native Computing Foundation has an impressive charter and governance structure; but more importantly, as InfoWorld’s Serdar Yegulalp summarizes in his article: The CNCF’s work could bring an open source hybrid cloud ecosystem...
Links / Observations / Security Strategy / Too long for Twitter
by Sujeet · Published January 18, 2016
In this 4-minute clip, Ari Kaplan talks about some observations and views regarding the perception of corporate data, about people being the key factor in creating a good enterprise security posture and about ownership...
More
Chief Information Security Officer at 7-Eleven. C|CISO, CCSK, CISM & CGEIT.
I build security excellence into the culture & brand by helping organizations grow trust with its customers, partners, employees & stakeholders.
Please feel free to reach me at sujeet@bambawale.com
Security vulnerability in the Cisco Adaptive Security Appliance
January 17, 2016
Links / Security Strategy / Too long for Twitter
Security tops CIO worries: CSO Online
September 15, 2014
M | T | W | T | F | S | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | ||||
4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 | 16 | 17 |
18 | 19 | 20 | 21 | 22 | 23 | 24 |
25 | 26 | 27 | 28 | 29 | 30 |
Cloud / Industry participation / Too long for Twitter
The Cloud Native Computing Foundation
January 21, 2016
Vox Populi