How strong should your Master Password be? For World Password Day we’d like to know

This blog first appeared on 1Passwords’ blog, and is written by customer Jeffrey Goldberg, Chief Defender Against the Dark Arts at 1Password.  Just how strong should a 1Password Master Password be? We recommend that Master Passwords be generated using our wordlist generator using passwords that are four words long. This gets you something like “napery turnip speed

By Guest BlogsProgram LaunchesProgram Updates
Bugcrowd and Fitbit partner to launch public security bug bounty program

This customer blog originally appeared on Fitbit’s engineering blog, written by Katie Foster, security engineer at Fitbit.  Fitbit has always been committed to protecting consumer privacy and keeping data safe. Our internal security team is constantly testing our products for vulnerabilities as we strive to continuously strengthen our security. And, as our devices become more

By Bugcrowd NewsGuest BlogsProgram LaunchesSuccess Stories
Secret Program to Offer Rewards up to $250K

At Bugcrowd, we’ve long said that managed bug bounty programs allow organizations of any size or stage of security maturity to realize the benefits of a bug bounty program. This is why we’ve provided managed programs from day one and why I’m especially excited by today’s news. Today we are recruiting for a Secret customer

By Program Launches
Dash Launches Bug Bounty Program with Bugcrowd

This week, the Dash Bug Bounty program launched privately on the Bugcrowd platform, which means selected Bugcrowd researchers have been invited to study the Dash Core software for the purpose of identifying bugs and vulnerabilities. For the first couple of weeks the program will run privately, and then it will be opened to the public so that any white-hat hacker

By Program Launches
Centrify’s Bug Bounty Program with Bugcrowd

It’s an exciting time to be in information security. Black hats are attacking more web sites, constructing more 0-day threats and phishing more credentials and payment data. The proliferation of smart IoT devices and new technologies create opportunities for malicious activities. Nation State actors and the vulnerabilities they exploit are gaining visibility.

By Guest BlogsProgram Launches