Get a Pentest and security assessment of your IT network.

Cyber Security

Implementing Bug Bounty Programs: The Right and Wrong Approaches

David Baker, chief security officer at Bugcrowd, talks about the right and wrong approaches for implementing bug-bounty programs. Baker talks about how companies are moving towards more of an API-based platform, where you have a web application that sits on your cell phone and that has an API layer that feeds back into a back-end service. Baker: “You have to realize that the crowd is going to find a lot more vulnerabilities than your typical in-house pen-test team”””

Source: https://threatpost.com/implementing-bug-bounty-programs/146385/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security