Remove Banking Remove How To Remove Information Security Remove Program Management
article thumbnail

Former Amazon exec inherits Microsoft’s complex cybersecurity legacy in quest to solve ‘one of the greatest challenges of our time’

GeekWire

But in the larger scheme of the company, the initiative raises a natural question: How can Microsoft justify making so much money on security when it’s still routinely patching critical holes in its software? “He’s fascinated with problems and opportunities, and how to engineer solutions,” Hall said.

Microsoft 104
article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

” Then my friend gestured to a bank of elevators where the door had just closed on three men in suits. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

” Then my friend gestured to a bank of elevators where the door had just closed on three men in suits. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

” Then my friend gestured to a bank of elevators where the door had just closed on three men in suits. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others.