Modern field guide to security and privacy

How bug bounties are shaping cybersecurity

|
Leah Mills
The motivations of individual, independent security researchers vary, said Luke Young, one of the top bug hunters on the HackerOne and Bugcrowd platforms and a senior information security engineer at LinkedIn. Watch his lightning talk here: https://www.youtube.com/watch?v=ewTyLlxx0HU

During the busy week of the RSA Conference in San Francisco, Passcode and Uber brought together luminaries from AT&T, HackerOne, LinkedIn, the Department of Defense, and Luta Security to talk about one of the most disruptive ideas in security: bug bounty programs.

Leah Mills/The Christian Science Monitor

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.
QR Code to How bug bounties are shaping cybersecurity
Read this article in
https://www.csmonitor.com/World/Passcode/2017/0224/How-bug-bounties-are-shaping-cybersecurity
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe