
Bug Bounty
-

Contributed by: Rena Chua, Bug Bounty Advisor for HackerOne As a Chief Information Security Officer (CISO), you are responsible for your organisation’s information and data security. Your job is to reduce the risk of a security incident, protect your brand and assets, and ensure the security of your customers and their valuable data. You know…
-

By: Taylor Armerding, Security Expert at Synopsys Software Integrity Group Apple is taking bug bounties to a new level — a level that some say could spur an arms race to acquire zero-day vulnerabilities between the good guys and bad guys. Not that bug bounty programs are new. They’ve been around for a long time —…
-

By: Laurie Mercer, Security Engineering Lead at HackerOne Myth #1: Bug Bounty Programs Have to Be Public Public bug bounty programs are a way to publicly demonstrate how secure your products are. “If you don’t think our service is secure, we invite you to find a bug!” However, not all bug bounty programs are public. In…

You must be logged in to post a comment.