Sunday, April 11, 2021
Home Tech The do’s and don’ts of bug bounty programs with Katie Moussouris –...

The do’s and don’ts of bug bounty programs with Katie Moussouris – TechCrunch

In the frenzy to launch, cybersecurity doesn’t at all times get the eye it deserves, and but it’s one of the primary issues that startups study can — and will — go unsuitable.

Hacker and safety researchers might be some of your greatest belongings in serving to your startup keep safe. Vulnerability disclosure and bug bounty programs are half of working with the hacker group to construct a stronger, extra resilient firm. But these usually are not a alternative for safety investments, which as a rising firm you shouldn’t overlook.

Katie Moussouris has been in cybersecurity circles since some of the world’s greatest tech corporations had been startups, and helped to arrange the primary vulnerability disclosure and bug bounty programs. Moussouris, who runs consultancy agency Luta Security, now advises corporations and governments on discuss to hackers and what they should do to construct and enhance their vulnerability disclosure programs.

At TC Early Stage, Moussouris defined what startups ought to (and shouldn’t) do, and what priorities ought to come first.


Knowing the fundamentals

A bug bounty alone isn’t sufficient, and outsourcing the method to a platform isn’t going to save lots of you time. Moussouris defined the fundamentals and what differs between vulnerability disclosure, penetration testing and bug bounties.

Vulnerability disclosure is the method by which you hear about vulnerability from the skin. You digest that vulnerability by some means internally in your group and work out what to do with it — whether or not to create a patch, prioritize that patch, and then what to launch to the general public [ … ] What it comes all the way down to is that organizations want tips on deal with these points appropriately.

Next we’ve obtained penetration testing: hiring skilled hackers below contract [who have] a selected set of abilities that match your downside set, and you pay them. They’re below a nondisclosure settlement (NDA) to maintain your vulnerabilities secret for so long as you want them — maybe without end — and you’re at your leisure as as to if or not you repair these vulnerabilities.

Finally, bug bounties are merely including a money reward to the method of vulnerability disclosure programs. (Time stamp: 3:20)


ISO requirements are your pal

Leave a Reply

All countries
135,942,894
Total confirmed cases
Updated on April 11, 2021 5:01 am

Most Popular

Most Popular

Recent Comments

Chat on WhatsApp
1
Hello
Hello,
How can we help you?