Operationally Necessary Cookies
Instructure, from its inception, has proactively published the results of its annual security survey to add full transparency to its security posture.
Initially the survey was based on traditional penetration testing results, but the team quickly realized this approach offered limited value and was not a comprehensive method to identifying critical vulnerabilities.
In 2014 Instructure turned to Bugcrowd to provide a more leading-edge and thorough crowdsourced based assessment.
Instructure’s traditional penetration testing approach offered limited value and was not a comprehensive method to identifying critical vulnerabilities.
Working with Bugcrowd has moved Instructure beyond just the checkbox pen tests, to the results delivered by a cadre of human researchers with vast experience, knowledge and purpose. New collaboration between Instructure’s vulnerability detection group and the remediation process engineering team has expedited faster vulnerability resolution.
Instructure has seen 5X growth in vulnerability findings over traditional security testing. The team is investing in additional Bugcrowd programs to expand the footprint of their security program. Read the full case study below to learn more about Instructure’s bug bounty program.
The cybersecurity landscape is an ever evolving one, so we knew we had to do something different, something innovative with this year’s audit, and that is what Bugcrowd offered us. We’ve continued with the Bugcrowd program because it consistently delivers quantifiable results and practical reports, tools that we then can use to internally remediate issues before they become customer problems. We now know what to tackle first.
Empower Your Security Team With a Crowd of White Hat Hackers to Find and Fix Vulnerabilities in Your Code Before the Bad Guys Do.
From Our BlogSeptember 26, 2020A Byte-ful with TomNomNomSeptember 24, 2020Bugcrowd’s October Challenge Month!September 23, 2020Can the Crowd Handle Network Pen Testing?MORE BLOG POSTSNewsSeptember 16, 2020Beyond Compliance: Bugcrowd Leverages Crowdsourcing to Find Server Vulnerabilities Before Cybercriminals DoSeptember 9, 2020Legality of Security Research to be Decided in US Supreme Court CaseSeptember 9, 2020Bugcrowd Expands its Advisory Board with the Appointment of Two Distinguished Industry ExecutivesMORE NEWSEventsByteCon2020- September 21-25, 2020ByteCon is a community driven framework organized by Byter Cyber Labs for building online events…Connect With UsDarkCTF – September 25-27, 2020DarkArmy is a non-profit and diverse community of students and cybersecurity enthusiasts from all across…Connect With UsSecurity Flash with ActiveCampaign: How to Build Trust in a Time of Global UncertaintyHow do you build trust and confidence during a time of economic turbulence? We’re living…Connect With UsMORE EVENTS
MORE BLOG POSTS
ByteCon is a community driven framework organized by Byter Cyber Labs for building online events…
DarkArmy is a non-profit and diverse community of students and cybersecurity enthusiasts from all across…
How do you build trust and confidence during a time of economic turbulence? We’re living…
Stay current with the latest security trends from Bugcrowd