News & Analysis as of

Bug Bounty Program

McDermott Will & Emery

Uber Criminal Complaint Raises the Stakes for Breach Response

On August 20, 2020, a criminal complaint was filed charging Joseph Sullivan, Uber’s former chief security officer, with obstruction of justice and misprision of a felony in connection with an alleged attempted cover-up of a...more

Harris Beach Murtha PLLC

Can Hackers be Ethical, not Evil?

We are increasingly seeing situations in which a client’s information systems are breached by an ethical hacker. Typically, they take a screen shot or two of data to prove their accomplishment, carefully redact any...more

Patterson Belknap Webb & Tyler LLP

Are Bug Bounty Programs Worth It?

Almost weekly, it seems there is another news article about a bug bounty program sponsored by a major corporation where an amateur hacker – often a teenager – is paid a sizeable sum of money for finding a bug in a company’s...more

Patterson Belknap Webb & Tyler LLP

Bug Bounty Programs: What Every Organization Needs to Know

More and more companies are paying up – and paying more – to so-called “ethical” hackers who report data security bugs or vulnerabilities for a bounty. A report released last week by Bugcrowd, a crowdsourced cybersecurity...more

BCLP

Bounty or Bug Programs

BCLP on

Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. Some security officers, however,...more

BCLP

Bounty or Bug Programs: A How-To Guide

BCLP on

Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. There is a great deal of debate,...more

BCLP

Data Privacy Considerations for Starting or Evaluating a Bounty Program

BCLP on

Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. There is a great deal of debate,...more

Robinson+Cole Data Privacy + Security Insider

Car hackings and vulnerabilities update (Jeep/Fiat + GM)

Jeep/Fiat has been sued by a putative class alleging that they were harmed as a result of researchers’ ability to hack into a Jeep and take control of it. Jeep/Fiat filed a motion to dismiss, stating that the owners suffered...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide