87 min listen
What are bug bounty programs?
FromExploring Information Security - Exploring Information Security
ratings:
Length:
38 minutes
Released:
May 7, 2018
Format:
Podcast episode
Description
In this hunting edition of the Exploring Information Security podcast, Keith Hoodlet of Bugcrowd joins me to discuss bug bounty programs.Keith (@andMYhacks), is a solutions architect at Bugcrowd. He's also the co-host of Application Security Weekly. While Keith works at Bugcrowd, he also has a lot of experience participating in bug bounty programs. Check out his website AttackDriven.io.In this episode we discuss:What are bug bounty programs?Who are security researchers.Who is running the bug bounty program?When should an organization implement a program.More resources:Jason Haddix - Bug Bounty Hunting Methodology v2The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws by Dafydd Stuttard and Marcus Pinto
[RSS Feed] [iTunes]
[RSS Feed] [iTunes]
Released:
May 7, 2018
Format:
Podcast episode
Titles in the series (100)
What's happening at DerbyCon?: Ben Miller (@securithid) , Cliff Smith (@BismithSalamandr) , Paul "BubbaSec" Coggin (@PaulCoggin) , Dave Chronister (@bagomojo), Sean Peterson (@SeanThePeterson), and Jimmy Byrd (@Jimmy_Byrd) (and briefly @aprilwright ) join me to talk security. by Exploring Information Security - Exploring Information Security