Apple takes bug-hunting seriously!

Apple is now offering a bounty of up to $2M for information leading to the identification of vulnerabilities in Apple software, firmware and operating systems.

A major evolution of Apple Security Bounty, with the industry’s top awards for the most advanced research – Apple Security Research

Your Takeaway

This is how vendors keep ahead of the threat actors. It is up to you to have systems in place to make sure everyone and bit of equipment gets the updates done.

Not sure how to that? Have a look at the tools offered by Octagon Technology:

Technology Solutions | Octagon Technology

Octagon Technology’s Security Operations Centre is Online

Clive Catton MSc (Cyber Security) – by-line and other articles

Further Reading