The bug bounty debate: Black Hat 2010 panelists debate the merits of vendors paying for vulnerabilities

Share this article:
Alex Stamos of iSEC partners offers his take on the usefulness of incentive programs that encourage researchers to privately report vulnerabilities to vendors, in exchange for cash. While the initiatives might fatten the wallets of bug hunters, some believe it taints the mission of white-hat hackers.
Share this article:

More in Videos

Applying the cyber kill chain

In this video, SC Magazine chats with Chandra McMahon of Lockheed Martin on ways organizations can leverage the cyber kill chain in order to improve their detection, mitigation, and defense posture.

The evolving role of the CSO

In this video, SC Magazine's Danielle Walker interviews Trey Ford, global security strategist at Rapid7, to discuss the rapidly changing role of the CSO.

Added authentication in today's workplace

In this video interview, Dug Song, CEO of Duo Security, discusses the impact of two-factor authentication and its deployment in the workplace, as well as the effect that wearables will have on the enterprise in the future.