Top

Category: Uncategorized


Uncategorized, Vulnerabilities

Implementing Bug Bounty Programs: The Right and Wrong Approaches

July 11, 2019

Via: Threat Post

While bug-bounty programs may seem like a cure-all solution for companies looking discover vulnerabilities in their systems more efficiently, the fact remains that a program could overwhelm a firm’s internal security team and cause other major headaches if implemented the […]


Privacy protection, Security, Uncategorized

OMB framework lays out privacy requirements for fed agencies

November 5, 2015

Via: SC Magazine

In the first update in 15 years to the government’s Circular A-130, Managing Information as a Strategic Resource, OMB has proposed revisions to “enable OMB to provide timely and relevant guidance to agencies and will ensure that the Federal IT […]