1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Vetting researchers builds trust in bounty programs

Discussion in 'CSO' started by RSS, Nov 18, 2015.

  1. RSS

    RSS New Member Member

    Conservative enterprises have been tentative about joining forces with hackers, but third-party bug bounty platforms have proven that their vetting process ensures a highly qualified and trustworthy talent pool. Because security researchers are able to discover vulnerabilities and alert enterprises to flaws in applications before a breach, there is value in trusting ethical hackers.

    Bugcrowd’s recent State of Bug Bounty report noted that many bug bounty programs are commonly run on third-party platforms that, “manage the operational end of the programs, bringing the research community together and handling the payment process, opening up the opportunity for more companies to successfully run bug bounty programs.”

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page