skip to Main Content
This website use cookies which are necessary to its functioning and required to achieve the purposes illustrated in the privacy policy. To learn more or withdraw consent please click on Learn More. By continued use of this website you are consenting to our use of cookies.

Posts by Bugcrowd

Complete Guide to Pentesting

Penetration testing is a key cybersecurity best practice. Most organizations understand the need for it, but like many things in the industry, penetration testing can be a bit confusing. This blog covers penetration testing 101, helping to uncover the basics,…

Read More

2020 Bugcrowd Product Highlights

The Bugcrowd platform continued to evolve on our three key priorities to integrate better with your security workflows, provide security expertise on-demand, and personalize your user experience. Here’s a review of the platform capabilities that we built in 2020. Security…

Read More

2021 Cybersecurity Predictions from Casey Ellis

Nobody could predict some of the wildcards that 2020 threw us (I'm looking at you, murder hornets). Even still, we're feeling hopeful that 2021 will bring better times, so we asked Bugcrowd's Founder, Chairman, and CTO, Casey Ellis, to share…

Read More

The Difference Between Bug Bounty and Next Gen Pen Test

Last year we launched Next Generation Penetration Test (NGPT). It’s a new product with unique platform capabilities to meet organizations’ evolving application security needs as focused external threats grow at an accelerated pace. The next generation of pentesting can deliver…

Read More

Zero Tolerance for Gender Inequality

Gender inequality in the tech and infosec community is not new. Women make up 20-24% of all roles in cybersecurity and face continued discrimination in many forms that inhibit their professional careers. Microaggressions may seem insignificant to some, but they…

Read More

The Who, What, Where, and Why of VDPs

The average iPhone app has just under 50,000 lines of code. Testing at these volumes, while factoring in pressure to launch on time, makes it nearly impossible to surface all potential vulnerabilities pre-production. Organizations need a way to identify vulnerabilities…

Read More
Back To Top