article thumbnail

DoD Announces Third 'Hack the Pentagon' Bug Bounty Program

SecureWorld News

Department of Defense (DoD) is turning to the private sector to bolster its cyber defenses with the launch of the third iteration of its "Hack the Pentagon" bug bounty program. These firms will host crowdsourced security activities on behalf of the DoD. The Contractor shall perform to the standards in this contract.".

article thumbnail

Former Uber security chief charged with paying hush money to cover up 2016 hack

The Verge

Uber’s former security chief has been charged with obstruction of justice for trying to hide a data breach from the Federal Trade Commission and Uber management, according to a statement from the Department of Justice. Illustration by Alex Castro / The Verge. Sullivan was later fired.). Attorney.”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to incubate a winning innovation program

CIO Business Intelligence

This is why innovation programs have become so critical to sustaining the success of enterprises. Why incubating technology-focused innovation is important Securing and maintaining competitive advantage now requires organizations to accelerate technology-powered transformation. Soon after, Netscape achieved 80% of the browser market.

article thumbnail

James Madison University Seeks Professor – Intelligence Analysis Program

CTOvision

Please look it over and share it with others that may have an interest: Assistant / Associate Professor - Intelligence Analysis Program. Posted: 03/03/2016. The term of the position runs from mid-August 2016 to mid-May 2017. Institution: James Madison University. Location: Harrisonburg, VA. Type: Full Time. Richmond and Roanoke.

Analysis 150
article thumbnail

From fear to abundance: Rethinking job security in the age of generative AI

CIO Business Intelligence

By Chet Kapoor, Chairman & CEO at DataStax Along with the exciting possibilities of generative AI (genAI), there have been concerns around job (in)security and displacement. Instead of viewing it as a threat to job security, organizations can leverage genAI as a tool to empower their workforce and augment their capabilities.

Security 140
article thumbnail

Tech Moves: Nordstrom names chief information security officer; Meta research scientist joins AI2

GeekWire

(Nordstrom Photo) — Nicole Ford joined Nordstrom as chief information security officer. Ford previously served as vice president and CISO at Rockwell Automation, with past experience leading security transformation initiatives and developing cybersecurity programs. He also sat on the board of Bed Bath & Beyond.

article thumbnail

Tech Companies That Missed the Mark in 2016

CTOvision

From Snapchat Spectacles to virtual reality, 2016 was a year of innovation and growth in the tech industry. Normally, Google is one of those companies that does very well with their pranks, but 2016 brought one that didn’t have many people laughing. Not even Apple was free from the tech company fray in 2016. Rick Delgado.

Company 151