home_banner `

Content Icon

Structure a Low-Profile Bug Bounty Program

January 31, 2018 | Ask-An-Expert | Vulnerability Assessment and Management | By Marcus Ranum, IANS Faculty

While Google's bug bounty program is well designed and provides rich rewards, not every organization can operate at that high level. In this Ask-an-Expert live interaction, IANS Faculty Marcus Ranum describes how to build a well-structured, low-profile program that encourages participation using a more realistic reward scale. 


Please Login to continue or Become a Client

Related Research

Third-Party API Evaluation Checklist

When assessing the security of a third-party API, it is important to analyze its surface area, content, functionality and associated technologies. This tool details some common issues to check for and address. 

Infosec in 2019: New Trends in AppDev Security

As we enter the new year, IANS Faculty turn their attention to the critical information security issues facing enterprises. In this report, Jason Gillam details the current state of security in application development and looks ahead to the technologies and strategies coming to the fore in 2019. 

IANS Vulnerability and Breach Update: Q4 2018

Vulnerabilities and breaches are mainstream news regularly. With a new vulnerability seemingly discovered daily, which should be taken more seriously (i.e., patch now!) and which are overhyped? In this quarterly research report, IANS Faculty Mike Saurbaugh updates clients on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.

Banking/Financial Services Information Security

This collection of slides includes third-party data on all things information security within the banking and financial services sector. 

We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.