Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 11 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

44CON – Use bug bounties to fix the flaws you missed

by The Gurus
September 12, 2014
in Editor's News
Share on FacebookShare on Twitter

Bug bounty programs are a great step forward for the security industry, but the impact could be reduced if vendors focused on secure coding.
 
Speaking at 44CON in London, Katie Moussouris, chief policy officer at HackerOne said that the tide turned in 2010 with bug bounties when professional penetration testers began making money for their skills.
 
Asked if the more bug bounty programs there are, the lower price would be offered overall? Moussouris said it may not be the most cost effective way to find as many vulnerabilities as possible, but organisations should be making their bugs rarer and rarer with better code development. “Vendors are not doing that as skipping code tests, and that would make instances of bugs rarer and rarer, it should be better and rarer and money is steady,” she said.
 
“To make money, invest in security part first. Researchers have a choice on what they look at, it is not always about money and sometimes it is about exposure and recognition.”
 
Looking back at her own work at Microsoft, Moussouris said that it was developed as an incentive programme to turn bugs in earlier in the software development lifecycle. “The purpose of the programme is to incentivise researchers to look where we want them to look,” she said. “In determining the bug bounty programme, we looked at the pattern of bugs that we were getting anyway, which often came in after the code was locked and during manufacturing, which was the worst time.
 
“It is about managing expectations in a bi-directional relationship. Researchers are making an investment in time and skills, why would a tester waste time and effort on a vendor who doesn’t want it, or expect to be paid for it? Look at vendors who have proper programs and a desire to receive vulnerability reports.”
 
She said that organisations realise that they are open to vulnerabilities and bug bounty research may save a lot of headaches. Asked what a vendor would do if they were unsure if it was right for them, Moussouris said: “It is much better when both parties are willing and consenting. Trying to unlock the vendor desire to receive vulnerability reports can be a “subtle seduction”.
 
“If you are on the fence and thinking about doing this, what better time is there to align with the business needs than the time that they had aligned to fixing bugs?”

FacebookTweetLinkedIn
ShareTweet
Previous Post

44CON – Vulnerability allows Doom to be run on a printer

Next Post

UK National Cyber Security Programme failing to deliver benefits for business

Recent News

Ransomware

Clop Ransomware Gang Extorts Household Names including BBC, British Airways and Boots

June 9, 2023
code

Developers Kept Away From Coding, Estimated £10.4bn a Year Wasted

June 8, 2023
large open office, bright.

Employees Feel 10 Times Calmer in an Environmentally Friendly Office Space

June 7, 2023
Blue Logo OUTPOST24

Outpost24 Acquires EASM Provider Sweepatic

June 7, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information