skip to Main Content

Topic: Company Resources

Bug Bounty Myth #7: Bounty Programs Are Too Hard To Run and Manage

Over the past months, we’ve addressed the bug bounty misconceptions outlined in our recent guide, 7 Bug Bounty Myths, Busted. So far we’ve…

  • Discussed the misconception that bug bounties are all public
  • Examined the types of companies engaging with the bug bounty model
  • Debunked the perception some have that bug bounties are too risky
  • Talked about the testers who participate in bug bounty programs
  • Analyzed the kinds of results they yield
  • Looked at the knobs and levers available to manage and plan for a bug bounty budget

Today we’re taking a look at what it really takes to manage a bug bounty program in our last post in this series…

Read More

Bug Bounty Myth #6: Bug Bounties are Hard to Budget For

In the past several weeks, we’ve been addressing bug bounty misconceptions in our guide, 7 Bug Bounty Myths, Busted. So far we’ve…

  • Discussed the misconception that bug bounties are all public
  • Examined the types of companies engaging with the bug bounty model
  • Debunked the perception some have that bug bounties are too risky
  • Talked about the white hat hackers who participate in bug bounty programs
  • Analyzed the kinds of results they yield

Today we’re talking about the budget.

Read More

Bigger Bugs Drive Higher Payouts to the Crowd

Today, we’re very happy to announce the launch of Bugcrowd’s 2018 State of Bug Bounty Report! Now in its fourth year, the Bugcrowd State of Bug Bounty Report provides an unparalleled, inside look into the trends across the emerging crowdsourced…

Read More

Bug Bounty Myth #5: They don’t yield high value results.

Although bug bounties have gained incredible traction over the past year, many people still have questions and misunderstandings about what they are and how they work.

In the past several weeks, we’ve been addressing some of those misconceptions in our guide, 7 Bug Bounty Myths, Busted. So far we’ve…

  • Discussed the misconception that bug bounties are all public
  • Examined the types of companies engaging with the bug bounty model
  • Debunked the perception some have that bug bounties are too risky
  • Talked about the hackers who participate in bug bounty programs.

Today we’re getting down to what it’s all about… the results.

Myth #5: Bug bounties don’t yield high-value results.

Read More

Bug Bounty Myth #4: You Can’t Trust Hackers

In the past month, we’ve been addressing some commonly held misconceptions about the bug bounty model, outlined in our guide, 7 Bug Bounty Myths, Busted. So far we’ve discussed the misconception that bug bounties are all public, examined the types of companies engaging with the bug bounty model, and debunked the perception some have that bug bounties are too risky. This week, we’re talking about the folks that make this economy go ‘round… the security researchers.

Myth #4: You Can’t Trust Hackers

False. With the right guidelines and incentives, white hat hackers are the good guys, security researchers that approach breaking into code like an adversary to help organizations.

Read More

Bug Bounty Myth #3: Running a Bug Bounty Program is Too Risky

In our recently released guide, 7 Bug Bounty Myths, Busted, we addressed some common misconceptions about the bug bounty model. We’re spending some time each week to take a deeper dive into those myths one by one. We started by addressing the misconception that bug bounty programs are all public and open to everyone and last week discussed the types of companies engaging with the bug bounty model. This week, we’re talking about risk…  

Read More

Bugcrowd Programs at a Glance

The crowdsourced security space is evolving rapidly. At Bugcrowd, we have more first-time Program Owners than ever trying out crowdsourced security economics through our Vulnerability Disclosure Programs and hundreds who have transitioned to on-demand and ongoing Bug Bounty Programs. We…

Read More
Learn More About The Most Critical Vulnerabilities of 2019Download Report
+
Back To Top