Bug Bounty Programs: Are You Ready? - part 3
The Bug Bounty movement grew out a desire to recognize independent security researcher efforts in finding and disclosing bugs to the...
Bug Bounty Programs: Are You Ready? - part 2
In this part we’ll discuss why an organization needs to launch a bug bounty program, and what limits the value they will likely extract from
Suits & Spooks: Shadowbrokers, Attribution, and Responsible Disclosure
Threat actor attribution in the cyber world – when done properly – is a damned difficult task complicated by missing and inaccessible...