Taking Back Pen Tests

Is my stuff secure? Penetration Tests, or Pen Tests,  show external entities that you care about security. At least that’s often what they’re used for, right? Whether it’s a customer, partner, or auditor, this is one of the most accessible and acceptable standards for demonstrating the security of your web apps, APIs, network, etc. At

By Thought Leadership
Open Source Software Security

As the amount of software powering our lives continues to increase, developers are churning out code faster. While this makes consumers’ lives easier, we still need to bake in security well before code is released. With consumers demanding more, companies are being pushed to release new features faster. Add to this the move to DevOps

By Thought Leadership
ESG Report: Crowdsourced Security Making Waves

Last week we released the ESG Research Insights Report, Security Leadership Study – Trends in Application Security, revealing what CISOs are looking to prioritize in the year to come. With the ever-expanding threat landscape and increasingly sophisticated adversaries, organizations are looking to proactive approaches to security. In fact, the report indicated a notable increase in

By Thought Leadership
ESG Research Insights Report: Security Leadership Study – Trends in Application Security

Today we released the ESG Research Insights Report, Security Leadership Study – Trends in Application Security, revealing what CISOs are looking to prioritize in the year to come.    The report highlights challenges with current application security testing methods, crowdsourced security adoption and benefits, security leadership application security priorities, and DevSecOps adoption within the enterprise.

By Bugcrowd NewsThought Leadership
5 Ways to ‘Outhack them all’ in Leadership

We say “Outhack them all” a lot here at Bugcrowd. It’s part of our ethos – our way of thinking and being. Hacking is all about thinking differently to achieve greatness — it’s something I find incredibly inspiring. Recently, I read It’s Your Ship, a phenomenal autobiography written by Captain Michael Abrashoff, the former commander

By Thought Leadership
How Governments are Running Effective Bug Bounty Programs

If you’re reading this article, statistically speaking your organization might be getting hacked. In the private sector, the Equifax hack and Intel’s processor vulnerabilities took the mainstream media by storm. And over the past year, data breaches of U.S. government networks, once novel, have become pervasive. Take it from the Office of Personnel Management (OPM) or the IRS – no one is safe

By Cybersecurity NewsThought Leadership
3 Reasons Why Every Company Should Have a VDP

Too often we see security researchers, whitehat hackers, IT leaders, academics, and journalists reach out to organizations after discovering a vulnerability; only to find that there is no obvious channel to receive such report. With hundreds of vulnerabilities found daily, it’s crucial to provide an obvious and easy way for external parties to report these

By Program ManagementThought Leadership