Rep. Nancy Mace, R-S.C., speaks during a hearing with the House Oversight and Accountability committee in the Rayburn House Office Building on April 11, 2024 in Washington, D.C. (Photo by Anna Moneymaker/Getty Images)
The legislation to make contractors implement VDPs aligned with NIST guidelines is aimed at protecting Americans’ data, co-sponsor Rep. Nancy Mace says.
The United Nations logo is seen at the United Nations headquarters on May 20, 2021 in New York City. (Photo by Angela Weiss / AFP) (Photo by ANGELA WEISS/AFP via Getty Images)
The company responsible for bug bounty platforms warns in a letter to top U.S. officials that the treaty’s vague language could undermine ethical security research.
Richard Zhu, center, and Amat Cama, standing to Zhu’s left, demonstrate their Firefox exploit at the Pwn2Own conference in March 2019 in Vancouver, British Columbia. (Pwn2Own)
A sign of Voatz’s deteriorating relationship with HackerOne came last month when researchers noticed that Voatz had updated its policy on the HackerOne website, saying it couldn’t “guarantee safe harbor” for researchers accessing the company’s live election systems. (Scoop News Group)
In this op-ed, a senior security engineer for Shopify discusses what has made the company's bug bounty program so successful. (Hint: it's the not the payouts.)
A sign of Voatz’s deteriorating relationship with HackerOne came last month when researchers noticed that Voatz had updated its policy on the HackerOne website, saying it couldn’t “guarantee safe harbor” for researchers accessing the company’s live election systems. (Scoop News Group)
The bug bounty program, sponsored by U.S. Cyber Command, zeroed in on finding vulnerabilities external to the Department of Defense Information Network.