What is Bug Bounty?
Welcome to our new hacking series with Katie Paxton-Fear ()! We’re so excited to offer you the ultimate, one-stop-shop, everything-you-need-to-know, guide to bug bounty and hacking. In this first series installment, Katie will take you through the basics of bug bounty and the Bugcrowd platform.
About the Author
Katie is a lecturer of Cyber Security at Manchester Metropolitan University and an Early Career Researcher in the domain of Security Research. She is a PhD from Cranfield University, studying natural language processing and insider threat. Her research roughly revolves around the intersection of AI/ML and InfoSec, both in how AI/ML can improve security applications and processes, supporting practitioners rather than supplanting them and the security of AI/ML systems. She’s very interested in pedagogy and teach on MMU’s Cyber Security degree program at Degree Apprenticeship, Undergraduate and Postgraduate level. She’s interested in new teaching methods and incorporating gamification and interactivity into lectures. She speaks at conferences and events fairly often and has had the pleasure to speak at CISA’s (Cyber Security and Infrastructure Agency) Cybersummit, BlackHat, British Computing Society, OWASP (Open Web Application Security Project) as well as speaking at events with industry partners.
In her free time she is an occasional bug bounty hunter, and makes educational cyber security YouTube videos for an audience of over 30,000 people! She used to work at Bugcrowd where she helped provide support to the community team in all things InfoSec and bug hunting. Although she is a data scientist/engineer at heart, security is really growing on her and she says it’s been great to leverage her data brain to help make the internet more secure. She’s now found herself knee deep in cyber security, having reported security vulnerabilities to large organizations such as Verizon Media and the US Department of Defense.
Want more from InsiderPhD? Follow her on Twitter here!
Get Started with Bugcrowd
Every minute that goes by, your unknown vulnerabilities leave you more exposed to cyber attacks.