Overview

Follows
0
Connections
0

Mr. Jiencke has more than 25 years of deep technical and development background, and a strong set of entrepreneurial experiences. He holds multiple technical designations, including CISSP (Certified Information System Security Professional) and MCTS (Microsoft Certified Technology Specialist) and he is a certified DBA for Oracle, SQL Server and Sybase. He has held various senior level technology management and technical positions with high tech companies, insurance carriers, and start-ups.

You do not have permission to post on this Chatter.
Login Create Account
We act as trusted advisers helping organizations better understand and minimize
We act as trusted advisers helping organizations better understand and minimize
Agile Insurance Analytics is a professional services company specializing in ins
Agile Insurance Analytics is a professional services company specializing in ins
Mike Jiencke followed .
This item does not have any text.
Despite growing awareness most web applications are still vulnerable to common e
There is a severe vulnerability in all version of Internet Explorer (IE Web Brow
For those who would like a more in depth description of the vulnerability, how i
It really comes down to the server that the client (smartphone, laptop, etc) is connecting to. Is that 'server' vulnerable? The vulnerability exists down in the transport layer of the TCP stack (keepalive processing) which is what makes it so bad. We all rely on TCP to communicate on the internet. The stolen memory locations could contain private encryption key (or your username and password, other sensitive info, etc) information used during the authentication process. This is why a re-key of certificates and change of passwords are recommended along with password changes if you have been conducting SSL based transactions. Check with your CA (Certificate Authority - Geotrust, Symantec, Godaddy, etc) for replacement of your certificates, which may be done for free as some CA's are doing.
The Heartbleed OpenSSL vulnerability affects SSL/TLS sessions created by certain
Commonly overlooked
An often overlooked attack vector. A top hacker pivot point within an organizati
The Breach attack combines tactics used in several classic attacks, Cross Site R
This article describes the risks inherent in traditional firewalls. The art
Millbrook’s Insurance data experts deliver powerful insurance data warehouse a

Credentials

  1. CISSP (Certified Information System Security Professional)
  2. CICP (Core Impact Certified Professional)
  3. SFCA (Sourcefire Certified Administrator)
  4. MCTS (Microsoft Certified Technology Specialist)
  5. Certified DBA for Oracle, SQL Server and Sybase.
Primary Expertise
Security & Compliance
Secondary Expertise
Current Technologies

Ratings

4.5
Out of 2 votes
2.5
Out of 2 votes
2
Out of 2 votes

My Status

This member has not yet set a status.

Recently Followed

There is no content to display.

Recent Connections

There are no members to display.

My Locations