Extortion and ransom demands but also when you say you're going to run a bug bounty program, if you say we're going to negotiate with you when you have access to our information or...
I think this distinction is pretty simple and I think you make it in your testimony, Ms. Moussouris, when you say that w...
My time has expired. In deference to the other members of the Committee, I'm going to stay within the limit.
There ought to be no question here that Uber's payment of this blackmail without notifying consumers who were gravely at...
Does Uber have that procedure in place now?
concealing it, in my view, is in effect aiding and abetting that crime.
I hope that you would agree that stronger legislative tools have to be given to the Federal Trade Commission.
It's the difference between a security consultant who says about your home, you have this vulnerability to forced entry ...
I hope that you will work with me on the Data Breach Accountability and Enforcement Act of 2017 which the Ranking Member...
And any such criminal conduct needs to be reported immediately to authorities.
China is now the second largest investor in R&D, a key driver of global competitiveness.