Tag Archives: Leave
(Reuters) – Uber Technologies Inc [UBER.UL] Chief Product Officer Jeff Holden is leaving the ride-hailing company, an Uber spokesman told Reuters on Thursday, the latest of more than a dozen senior executives to depart since last year.
Holden oversaw Uber Elevate, the company’s flying car operation, which is now headed by Eric Allison, the spokesman said, but declined to elaborate on the reason for his departure.
New Chief Executive Officer Dara Khosrowshahi has been shaking up the company since taking over Last August aiming to improve Uber’s reputation after a string of scandals.
Uber, along with Lyft Inc, scrapped mandatory arbitration to settle sexual harassment or assault claims earlier this week, giving victims several options to pursue their claims including public lawsuits.
Uber also launched a new app for its drivers last month, in an effort to improve an often contentious relationship.
Uber’s chief legal officer, Salle Yoo, and head of external affairs Dave Clark left the company in September.
Uber is also searching for a chief financial officer who can help take the company public in 2019. The CFO position has been vacant since 2015.
The Wall Street Journal earlier reported that Holden, who was hired by former Uber Chief Executive Officer Travis Kalanick from Groupon Inc (GRPN.O), told colleagues that Thursday was his last day with the company.
Reporting by Kanishka Singh and Abinaya Vijayaraghavan in Bengaluru; Editing by Peter Cooney and Gopakumar Warrier
As long as you know the right URL, anyone with access to the internet could retrieve all the data that was left online by marketing analytics company Alteryx. This is the second major exposure of data stored and improperly managed in the Amazon Web Services S3 storage service.
In the Alteryx case, it was apparent that the firm had purchased the information from Experian, as part of a data set called ConsumerView. Alteryx uses this data to provide marketing and analytics services. It put the data in AWS S3—and forgot to lock the door.
In November, files detailing a secret US intelligence collection program were leaked in the same manner, also stored in S3. The program, led by US Army Intelligence and Security Command, a division of the National Security Agency, was supposed to help the Pentagon get real-time information about what was happening on the ground in Afghanistan in 2013 by collecting data from US computer systems on the ground. Much as in the Alteryx case, the data was exposed by a misconfigured S3 bucket.
Here’s the deal: AWS defaults to closing access to data in S3, so in both cases someone had to configure S3 to expose the data. Indeed, S3 has the option to provide data over the web, if configured to do so. So, this is not an AWS issue, but one of stupidity, naïveté, or ignorance by people running their S3 instances.
Public cloud providers often say that they are not responsible for ineffective, or in these cases nonexistent, security configurations that leave data exposed. You can see why.
In these cases, white hat hackers informed those in charge about the exposure. But I suspect that many other such mistakes have been uncovered by people who quietly collect the data and move on into the night.
The fix for this is really common sense: Don’t actively expose data that should not be exposed. You need to learn about security configurations and processes before you bring the public cloud into your life. Otherwise, this kind of avoidable stuff will keep happening.