CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
  • Showcase
    • OneTrust
  • See all results
Home
Bug Bounty
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Bug Bounty

Dead cockroach on table showing the need to design right crowdsourced security testing model for bug bounties
Cyber SecurityInsights

The Romance of Bug Bounties

July 16, 2019
Beyond the challenges around risk and uncertainty, can bug bounties really deliver on their promise? Even as crowdsourced security testing continues to gain acceptance, what’s important is designing the right model to increase efficiency and avoid diminishing marginal returns. Read More
Image of bug on a keyboard representing whether the privacy issues and data abuses faced by Facebook can be considered just a bug in the system
Data PrivacyNews

Are Privacy Issues and Data Abuses Really Just a Bug in the Facebook System?

May 14, 2018
In an effort to get out in front of the data privacy scandal threatening to engulf the company, Facebook recently announced a new data abuse bounty program, which promises to pay people who report data abuses. But is this new data abuse bounty program going to result in any real changes to data privacy on Facebook? Read More
Image of U.S. capitol with dark clouds signifying how hackers are helping to secure voting machines
Cyber SecurityNews

Hackers to Help Make Voting Machines Safe Again

November 15, 2017
Fear of Russian hackers infiltrating voting machines in the last U.S. presidential election has led to a new bill to enlist hackers to find vulnerabilities. Read More
Image of a dead bug on keyboard representing how the Hack the Air Force bug bounty program has found 207 vulnerabilities
Cyber SecurityNews

Hack the Air Force Bug Bounty Program Yields 207 Vulnerabilities

August 10, 2017
For 24 days, 272 hackers pounded the Air Force's key public websites. The result? A cool 207 vulnerabilities were found, resulting in a $130,000 payday for the White Hats. Read More
Image of wolves hunting representing the 'Hack the Air Force' bug bounty program for white hats
Cyber SecurityNews

Bugs and Bombs – Why White Hats Want to ‘Hack the Air Force’

May 1, 2017
So how does the United States Air Force with over 5,000 aircraft in its inventory make sure that it’s online security is top notch? It’s simple – it invites people to hack its systems. Read More
Leveraging the Wisdom of the White Hat Community
Cyber SecurityResources

Leveraging the Wisdom of the White Hat Community

November 10, 2016
With the explosive growth of devices, we are introducing more vulnerabilities into the digital environment, and enterprises are facing increasing cyber risks. How can organizations engage the White Hat community to find security vulnerabilities as an additional layer of cyber defence? Read More
Image of open sign on wooden door representing companies in Asia being open to engaging the global community of independent white hats
Cyber SecurityInsights

Should Companies in Asia Engage the Global Community of Independent White Hats?

February 19, 2016
As the world becomes more complex non-traditional approaches to ensuring data security and protection must be evaluated. In this article Wei Chieh, the founder of SWARMNETICS draws a parallel between how we treat open source software and the Asian organisational attitude toward White Hat hackers (or ‘independent security researchers’) as assets that might help to stem the tide of security breaches that Asian companies face today. Read More

Get Connected

  • 7.9kFans
  • 12.6kFollowers
  •  Followers
  •  Subscribers

Stay Updated

Subscribe to our newsletter.

Thank you for subscribing!

Something went wrong.

We respect your privacy

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Thank you for subscribing!

Something went wrong.

We respect your privacy

Follow us

© 2019 Data Privacy Asia Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
  • Showcase
    • OneTrust
Start typing to see results or hit ESC to close
Regulations U.S. Cyber Threats EU GDPR Data Breach
See all results
Username
Password
Remember Me
Lost password?
Create an account
Enter username or email
Cancel