Skip to main content

Data Protection





Of Bugs and Bounties

When vendors first began crediting security researchers for reporting vulnerabilities in their products, the reward typically was your name in 12-point Arial at the bottom of a security advisory*. Those days are long past, and the bug bounty game has changed so dramatically now that independent security researchers can make a very comfortable living by finding bugs in the right kinds of products.







Don't Fall Behind

 

Get the latest security insights

delivered to your inbox each week.