HackDig : Dig high-quality web security articles for hackers

Model Assesses Readiness to Accept Outside Vulnerability Reports

The proliferation of independent and vendor-sponsored bug bounties has not only put some money in researchers’ pockets, but has also forced enterprises—and software makers—to put processes in place to handle outside bug reports.“Saying you want one is not enough,” said Katie Moussouris, chief policy officer at bug bounty platform provider H
Publish At:2015-09-22 18:05 | Read:2914 | Comments:0 | Tags:Vulnerabilities Web Security bug bounties bug reports Hacker


Tag Cloud