fbpx

Category Tag: Technology

Tech Firms & Bug Bounty Hunters: Where does your liability end?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24699" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]How am I liable? What can I do about it?[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] The last few years have seen the rise of bug bounty hunters:…

May Contain Traces of Log4j: Risk Management Strategies for Tech Firms

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24603" img_size="full"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_column_text] It’s only been a month and experts are already calling the Log4j vulnerability one of the greatest security disasters of our time. Given the…




    Personal InsuranceCommercial EnterpriseAssociations & Affinity GroupsLife & Benefits


      Personal InsuranceCommercial EnterpriseAssociations & Affinity GroupsLife & Benefits

      Generic filters
      Exact matches only