Follow Tweet This Facebook LinkedIn

Main menu

Skip to secondary content
Menu
  • Tech News
    • Last 48 Hours
    • Analytics
    • Artificial Intelligence
    • Careers
    • Cloud
    • Digital Transformation
    • Ecommerce
    • Education
    • Emerging Tech
    • Infrastructure
    • IT Workplace
    • Leadership
    • Managed Services & Outsourcing
    • Marketing
    • Mobility
    • Opinion
    • Privacy & Security
    • Public Sector
    • Software
    • Wireless & IoT
    • Women in Technology
    • Work from home
  • Resources
    • Reports and Whitepapers
    • News for CIOs
    • CIO Census
    • Digital Security Zone
    • Webinar Highlight Reports
    • Roundtable Highlight Reports
    • 2020 IT Salary Calculator
    • AI Directory
    • ITWC Talks
    • Featured Partner Content Hubs
    • Digital Magazines
    • Blogs
  • Events
    • Canada’s Top Women in Fintech/Blockchain
    • CANADA’S TOP WOMEN IN CYBERSECURITY
    • CIO OF THE YEAR
    • MapleSEC
    • UPCOMING EVENTS
    • FLAGSHIP EVENTS
    • VIrtual Events
    • Webinars
    • Roundtables
    • All IT World Canada Events
  • Videos
    • President to President
    • All Tech Videos
  • Podcasts
    • Cyber Security Today
    • #Hashtag Trending
    • Leadership in the Digital Enterprise
    • CMO Talks
    • ITWC Podcast Network
  • Engage
    • Blogger Opportunities
    • 2020 Vision
    • Gartner Corner
    • About Us
    • Privacy Policy
    • Contact Us
  • Subscribe
#TRENDING
  • Analytics
  • Technicity
  • Women in Tech
  • MapleSEC
  • Work from home
  • Morning Briefing
  • Leadership

OUCH! Free Content gets hurt by enabled Ad Blockers

Please consider unblocking us or Subscribe in support of our great non-gated content.

Tagged: security strategies malware

Security Encryption Graphic
Graphic via Shutterstock Shutterstock.com
Privacy & Security Public Sector

Pay millions for people to find bugs, argue security researchers

Howard Solomon
Howard Solomon
@HowardITWC
Published: January 9th, 2014


Related Content

U.S. Justice Department says Canadian to plead guilty to laundering money stolen by North Korean cyberattackers

Microsoft AV now blocks applications with malicious SolarWinds binaries

Saint John, N.B. shuts IT systems after ‘significant cyber attack’

Cyberattack on healthcare is ‘criminal activity that cannot be tolerated’ says Microsoft

Tweets by itworldca

Follow
Tweet This Facebook LinkedIn google+

Subscribe
Resources CanadianCIO Digital Security CMO Digital CDN Magazine IT Salary Calculator LightningPR Webinars and Events Tech Research Partner Content
IT World Canada Community About Us Contact Us Technology Videos IT News IT Blogs Mobility News Cloud Computing Technology Topics ITWC Talks
ITWC Websites ITWC.ca Channel Daily News.com IT World Canada.com IT Business.ca Direction Informatique.com
© 2021 IT World Canada