A Look Inside: Bug Bounties and Pen Testing

A Look Inside: Bug Bounties and Pen Testing

As more organizations turn to bug bounty programs, versus penetration testing, to weed out vulnerabilities in their products we ask Christie Terrill,

How deception technologies use camouflage to attract attackers | Salted Hash Ep 26
Mueller Adds DOJ Cybercrime Prosecutor To His Team
How—and why—you should use a VPN any time you hop on the internet

As more organizations turn to bug bounty programs, versus penetration testing, to weed out vulnerabilities in their products we ask Christie Terrill, partner at Bishop Fox, what she sees as the pros and cons of either approach.

Threatpost’s Lindsey O’Donnell also asks Terrill what kind of companies are best suited for bug bounty programs versus conducting their own penetration testing? Terrill also addresses what these methods mean for vulnerability disclosures and the legal nuances and complexities behind bug bounty programs.

Go to Source

COMMENTS