skip to Main Content

Topic: Thought Leadership

Bigger Bugs Drive Higher Payouts to the Crowd

Today, we’re very happy to announce the launch of Bugcrowd’s 2018 State of Bug Bounty Report! Now in its fourth year, the Bugcrowd State of Bug Bounty Report provides an unparalleled, inside look into the trends across the emerging crowdsourced…

Read More

Happy International Women’s Day!

Happy International Women’s Day! This day is all about celebrating the vast number of social, economic, cultural, technical and political achievements of women throughout history. Innovation, perseverance and respect are core to our mission at Bugcrowd, so we couldn’t let…

Read More

2018 CISO Investment Blueprint

As we saw in 2017, the number of data breaches and cyber-attacks is not slowing down. What’s more, security leaders are still focused on finding and investing in defensive tools to combat cybercrime. And yet still, adversaries are getting more…

Read More

Defining Intent in the Crowdsourced Security Model

Over the past few months, the widespread popularity and adoption of bug bounties and vulnerability disclosure have grabbed headlines. This rapid adoption paired with recent incidents have hastened the need to make sure things are defined clearly—specifically, the difference between…

Read More

The Uber Breach: Extortion Does Not Equal Bug Bounty

The bug bounty market is growing quickly. While an increasing number of organizations are embracing the concept, there still remains some confusion and ambiguity around paying hackers for vulnerabilities. Events like recently disclosed Uber breach illustrate this confusion. I’ll take this opportunity to clarify and define this rapidly evolving market.

Read More

Why You Can’t Ignore the Economics of a Bug Bounty

It’s common knowledge that the security industry has been facing a massive shortage of resources. Add the fact that companies are accelerating their cloud presence and growing an API ecosystem of their own. CISOs are up-leveling their security strategy by adding bug bounty programs to their toolbox.  

Read More
Back To Top