How to launch a successful bug bounty program

How to launch a successful bug bounty program

Laurie Mercer, security engineer at HackerOne, reveals what it takes to launch a successful bug bounty program.
Nobody wants to pay a juicy GDPR fine. Yet the more information that is available through internet-connected services, the greater the risk of a data breach. The quickest and most efficient way to find vulnerabilities in internet-connected systems is to run a bug bounty program.
The question I hear the most when talking to companies wanting a bug bounty program is “how do I get started?”
Here are four questions to ask yourself to understand how to get started:
Also of interest: Could veterans be the answer to the cyber skills shortage problem?

Copyright Lyonsdown Limited 2020

Top Articles

PrismHR outage possibly caused by a ransomware attack, experts believe

PrismHR suffered a cyber attack last week which forced it to shut down its flagship software that serves thousands of organisations worldwide.

Hackers exploited flaws in Accellion FTA to steal data from Qualys

Qualys said hackers exploited a zero day vulnerability in Accellion's FTA to infiltrate an FTA server deployed in its DMZ environment.

SITA data breach compromised data associated with multiple international airlines

SIT, has revealed it recently suffered a major cyber attack that compromised information belonging to customers of several airline companies.

Related Articles