Security vulnerability in the Cisco Adaptive Security Appliance
Cisco’s disclosure of a security vulnerability in the Cisco Adaptive Security Appliance
Life between the lines
Industry participation / Observations / Security Strategy / The Insecure Post
by Sujeet · Published January 17, 2016
On its Management Blog, Bloomberg Business advocates three things to encourage candid feedback: Find trusted advisors Reinforce candid feedback Find the value in every message So, I called on Aalaap – one of the...
Hanesbrands Inc. (umbrella firm for various brands including L’eggs, Playtex, Wonderbra, Champion, and Maidenform) stated on Wednesday – June 29, 2015; that a customer order database was breached by a hacker in June 2015, compromising information for about 900,000 online and telephone customers. Yours truly was a customer at that time, and was a part of the folks notified by Hanes.
Observations / Status / Too long for Twitter
by Sujeet · Published July 28, 2015 · Last modified July 29, 2015
Security researcher Sijmen Ruwhof has publicly disclosed a security vulnerability in a PHP file manager used by the likes of Nestle, Siemens, Loreal, 3M, Hilton, T-Mobile and Nintendo; to manage confidential content. The disclosure talks about this content being accessible. The vendor has not responded; but, as of July 29, the Siemens Social Media Team has responded via social media.
Observations / Security Strategy / Status / Too long for Twitter
by Sujeet · Published July 26, 2015 · Last modified July 27, 2015
The July 23 shooting in a movie theater at Lafayette, Louisiana. This article looks at advances in imaging technology and the established example of the Transportation Security Administration to manage high-traffic areas with a view of establishing a security baseline without impacting the user experience.
Observations / Security Strategy
by Sujeet · Published July 18, 2015 · Last modified February 22, 2016
martinak15 / Foter / CC BY In April 2010, the National Institute of Standards and Technology published a set of recommendations as a guide for protecting the confidentiality of Personally Identifiable Information [PDF]. Co-authored...