• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

#IMOS21: Six Components of a Bug Bounty Program

You are here: Home / General Cyber Security News / #IMOS21: Six Components of a Bug Bounty Program

Speaking at the Spring Infosecurity Journal On the web Summit, Sean Poris, director, item security at Verizon Media, explored how to operate a bug bounty application, outlining the 6 factors of a thriving major bounty structure.

Poris described that, by investing in bug bounties, corporations are most likely tapping into “hundreds of hundreds of world-wide hackers” that assume about software program and vulnerabilities in approaches that internal employees could not.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Avast Ultimate Suite 2021

Protect yourself against all threads using AVAST Ultimate Suite. AVAST Ultimate Suite protects your Windows, macOS and your Android via Avast Premium. In addition it comes with AVAST's well-known VPN service SecureLineVPN. Therefore, it will be a security and privacy in one package.

Get AVAST Ultimate Suite with 65% discount certified seller: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


He also claimed that figuring out and knowledge your objectives is essential when it will come to functioning a bug bounty software, so corporations ought to have distinct emphasis on “what they are seeking to execute in standing up the system.” This ought to also include using time to contemplate “what researchers will want from your program” and how you can do the job along with them, together with the extended-expression goal of your method.

At the time those people areas are founded, Poris said there are six elements to guaranteeing ongoing bug bounty achievement for an firm.

These 6 elements are:

  • Scope: what’s in, what is out?
  • System: report ingestion and communications
  • Expertise: hackers and teams
  • Financials: budget, forecast and payments
  • Functions: system, regularity and oversight (metrics)
  • Coverage: procedures of the road, safe and sound harbor and compliance
  • Finally, “a bug bounty method is a crowdsourcing initiative that benefits individuals for exploring and reporting software bugs,” and by getting a viewed as, federation-like tactic, companies can make a success of their bug bounty journeys.


    Some sections of this short article are sourced from:
    www.infosecurity-journal.com

    Previous Post: «critical cisco jabber bug could let attackers hack remote systems Critical Cisco Jabber Bug Could Let Attackers Hack Remote Systems

    Reader Interactions

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    Primary Sidebar

    Recent Posts

    • #IMOS21: Six Components of a Bug Bounty Program
    • Critical Cisco Jabber Bug Could Let Attackers Hack Remote Systems
    • FatFace Faces Customer Anger After Controversial Breach Response
    • Chinese Hackers Used Facebook to Hack Uighur Muslims Living Abroad
    • Policyholders may be the primary target in hack of cyber insurance provider CNA
    • Managing the great return: What CISOs should consider when reopening the office
    • Active Exploits Hit WordPress Sites Vulnerable to Thrive Themes Flaws
    • 9,000 employees targeted in phishing attack against California agency
    • Ransomware Attack Foils IoT Giant Sierra Wireless
    • Microsoft Exchange Servers See ProxyLogon Patching Frenzy

    Copyright © TheCyberSecurity.News, All Rights Reserved.