To get in touch about speaking at your event, email [email protected]

cje
press Feb 7, 2018 · Threatpost

Bug Bounty Programs Turn Attention to Data Abuse

A Threatpost article examines how bug bounty programs are expanding their scope to reward researchers for discovering data abuse alongside traditional software vulnerabilities. Casey Ellis discusses the shift in bug bounty focus and the importance of addressing data misuse as a security priority.

Source description — as published

Discusses the evolution of bug bounty programs to include rewards for finding instances of data abuse, not just traditional software vulnerabilities.