shadow
Modern field guide to security and privacy

How bug bounties are shaping cybersecurity

Leah Mills
The motivations of individual, independent security researchers vary, said Luke Young, one of the top bug hunters on the HackerOne and Bugcrowd platforms and a senior information security engineer at LinkedIn. Watch his lightning talk here: https://www.youtube.com/watch?v=ewTyLlxx0HU

During the busy week of the RSA Conference in San Francisco, Passcode and Uber brought together luminaries from AT&T, HackerOne, LinkedIn, the Department of Defense, and Luta Security to talk about one of the most disruptive ideas in security: bug bounty programs.

Leah Mills/The Christian Science Monitor

of 5 stories this month > Get unlimited stories
You've read 5 of 5 free stories

Only $1 for your first month.

Get unlimited Monitor journalism.