Bug Bounty vs. VDP | Which Program Is Right for You?
What Are the Key Differences between Bug Bounty and VDPs? A VDP is a structured method for third parties, researchers, and ethical hackers to report…
What Are the Key Differences between Bug Bounty and VDPs? A VDP is a structured method for third parties, researchers, and ethical hackers to report…
Have the WAF security companies got you thinking that a firewall is enough? In a modern landscape, development and security move faster, and so do…
What Is a Bug Bounty? A bug bounty is a reward offered by organizations to ethical hackers for discovering security vulnerabilities. A bug bounty program…
What Does the Rise of Cloud Mean? According to Bressers, “It was easy to believe that your systems were secure in the past. They were behind…
At HackerOne’s 2021 Security@ conference, we spoke with Douglas Day, an experienced ethical hacker and senior product security engineer who has managed Elastic’s bug bounty…
Johan Svensson joined Detectify as an intern in March 2017, and was hired full-time in October that same year. Now he works as a senior…
What Is a Bug Bounty Platform? A bug bounty platform is software that deploys and tracks a bug bounty program. A bug bounty is a…
Security is not compliance. This is something that the security champions at Detectify can agree on and each employee practices security everyday to help keep…
For TikTok, a platform that sees more than one billion monthly active users, staying ahead of cyber threats is always top of mind. TikTok relies…
Greetings, digital guardians. Today, we’ll be diving into the wonderful world of External Attack Surface Management (EASM) platforms. As the sun rises on another day…
Created/Updated: August 7, 2022 A number of security people have come out against Amazon buying One Medical. It’s to be expected, as most security people…
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by InsiderPhD. Every week, she keeps…