- Chief Compliance Officer and VP of Legal Affairs, Arrow Electronics
By Joe Mont2018-02-13T09:30:00
As a cyber-security tool, companies are turning to outsiders to hunt down software and security flaws. The concern is that bug bounties may become excessive or reward illegal activity.
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2022-07-25T19:08:00Z By Jeff Dale
Ridesharing company Uber reached a nonprosecution agreement with the Department of Justice to resolve a criminal investigation into its 2016 data breach and subsequent cover-up.
2020-08-21T15:01:00Z By Aaron Nicodemus
Uber’s former security chief has been charged in connection with an alleged cover-up of a 2016 data breach that compromised millions of people’s personally identifiable information.
2020-05-06T20:02:00Z By Martin Woods
All cyber-attacks leave a trail. These trails can be complex, of course, but the criminals cannot avoid them. Thus, they leave a supply chain of intelligence and data.
Site powered by Webvision Cloud