BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

How Much is Goldman’s Code Worth?

Posted December 6, 2010    Peter McCalister

The trial of a former Goldman Sachs programmer accused of stealing source code to take to a competitor has begun in somewhat of a public spectacle. The Wall Street Journal unveiled some particularly interesting details. For example, the programmer was one of the highest paid in the company with a $400,000 annual salary, but competitor Teza Technologies offered him over $1 million in total pay including a $700,000 bonus.

Greedy much?

So how does the highest paid programmer of one of the largest investment banks in the world get a nearly three-fold salary hike by a much smaller competitor? Ok, ok, he’s innocent until proven guilty, but if he is guilty, I would bet a good chunk of cash that the $1 million paycheck was the price the company was paying for Goldman’s code.

Here’s the breakdown. He was offered $300,000 in salary, $700,000 in bonus and $150,000 in profit sharing. Here’s my question to you – which portion of his pay do you think was (could be) the bribe and could the programmer have gotten more? How much is Goldman’s source code worth?

Personally I think he was drastically underpaid for the value of the code, but a clean million is plenty to motivate someone to steal data despite the actual value of the stolen property being much higher.  Unfortunately this could be construed as a case of dealing with the symptom instead of the disease.  Had a least privilege solution been instituted then he wouldn’t have had the ability to misuse privilege and accomplish the theft at any price.

Leave a Reply

Additional articles

PowerBroker for Unix & Linux helps prevent Shellshock

Posted September 25, 2014    Paul Harper

Like many other people who tinker with UNIX and Linux on a regular basis, BASH has always been my shell of choice.  Dating back to the early days moving from Windows to a non-Windows platform, mapping the keys correctly to allow easy navigation and control helped ensure an explosion of use for the shell. Unfortunately,…

Bash “Shellshock” Vulnerability – Retina Updates

Posted September 24, 2014    BeyondTrust Research Team

A major vulnerability was recently discovered within bash which allows arbitrary command execution via specially crafted environment variables. This is possible due to the fact that bash supports the assignment of shell functions to shell variables. When bash parses environment shell functions, it continues parsing even after the closing brace of the function definition. If…

pbps-blog3

7 Reasons Customers Switch to Password Safe for Privileged Password Management

Posted September 24, 2014    Chris Burd

It’s clear that privileged password management tools are essential for keeping mission-critical data, servers and assets safe and secure. However, as I discussed in my previous post, there are several pitfalls to look out for when deploying a privileged password management solution. At this point, you may be wondering how BeyondTrust stacks up. With that,…

Tags:
, , , , ,