The Latest in IT Security

Posts Tagged ‘bug bounty’

Every business needs to have a process in place for handling security vulnerability reports, but some organizations take a much more proactive approach to dealing with security researchers. An increasing number of hardware and software vendors have formal bug bounty programs. Google, for example, runs its own vulnerability rewards program, and Microsoft has multiple bug […]

Read more ...

Gogo has announced the launch of a Bugcrowd-based public bug bounty program covering the company’s main websites. Gogo has invited researchers to find vulnerabilities in gogoair.com, gogoinflight.com and their subdomains. Gogoair.com is the website where users create accounts and obtain pricing information.

Read more ...

The backdrop to the U.S. government’s first public-facing bug bounty program announced earlier this year was that the Hack the Pentagon program was a way to connect with legitimate researchers and make a subtle plea for help. On Friday, Veterans Day, the U.S. Army became the second critical agency to announce a reward program, and […]

Read more ...


Categories

SATURDAY, APRIL 19, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments