Supporting data-driven software development life-cycles with bug bounty programmes
A growing number of organisations are utilising the skills of a global base of white-hat hackers in order to identify pre- and post-deployment vulnerabilities. Despite the widespread adoption of bug bounty programmes, there remain many uncertainties regarding the efficacy of this relatively novel se...
Main Author: | Walshe, T |
---|---|
Other Authors: | Simpson, A |
Format: | Thesis |
Language: | English |
Published: |
2023
|
Similar Items
-
An empirical study of bug bounty programs
by: Walshe, T, et al.
Published: (2020) -
CORPORATE CYBERSECURITY : IDENTIFYING RISKS AND THE BUG BOUNTY PROGRAM/
by: Jackson, John, author 237334
Published: (2022) -
Bountychain: Toward Decentralizing a Bug Bounty Program with Blockchain and IPFS
by: Alex Hoffman, et al.
Published: (2021-06-01) -
Navigating vulnerability markets and bug bounty programs: A public policy perspective
by: Aviram Zrahia
Published: (2024-02-01) -
BOUNTIFUL MALAYSIA /
Published: (2014)