Apple is now offering a bounty of up to $2M for information leading to the identification of vulnerabilities in Apple software, firmware and operating systems.
Your Takeaway
This is how vendors keep ahead of the threat actors. It is up to you to have systems in place to make sure everyone and bit of equipment gets the updates done.
Not sure how to that? Have a look at the tools offered by Octagon Technology:
Technology Solutions | Octagon Technology
Octagon Technology’s Security Operations Centre is Online
Clive Catton MSc (Cyber Security) – by-line and other articles

