press Jun 25, 2014 · ThreatPost
Crowdsourcing Finding Its Security Sweet Spot
ThreatPost published an article examining how crowdsourcing has become an increasingly accepted model within the cybersecurity industry. Casey Ellis discusses the maturation of crowdsourced security approaches and their growing adoption as organizations recognize their practical value for vulnerability discovery.
Source description — as published
An article discussing how crowdsourcing is finding its "sweet spot" and becoming a more accepted model within the cybersecurity industry.