home_banner `

Content Icon

Avoid Common Bug Bounty Pitfalls

November 27, 2019 | Ask-An-Expert Writeups | Vulnerability Assessment and Management | By Adrian Sanabria, IANS Faculty

A poorly planned bug bounty can go sideways quickly. In this Ask-an-Expert written response, IANS Faculty Adrian Sanabria details some common pitfalls as well as some ways to avoid them.


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

BAS Tools: 2019 Market Overview

Breach and attack simulation (BAS) tools are designed to help security teams assess the effectiveness of their programs for identifying and responding to attacks. In this report, IANS Faculty Dave Shackleford provides an overview of the space, including the pros and cons of some of the top vendors.

IANS Vulnerability and Breach Update: Q3 2019

Vulnerabilities and breaches are mainstream news regularly. With a new vulnerability seemingly discovered daily, which should be taken more seriously (i.e., patch now!) and which are overhyped? In this quarterly research report, IANS Faculty Mike Saurbaugh updates clients on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.

Vulnerability Exception Form Template

Exceptions must sometimes be made during the vulnerability management process. This template uses a simple reporting-analysis-approval workflow to document the details of an exception to a vulnerability management process, the proposed workaround/mitigation strategy, analysis and approval process.