Our new Biannual ICS Risk & Vulnerability Report is the most up-to-date look at CVEs disclosed in OT devices. • Check it out!

  • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • Português
    • 中国人
    • 中國人
    • 한국인
  • Why Claroty
  • Products
    • Platform
      • Comprehensive Platform Overview
      • Claroty Edge
      • Continuous Threat Detection
      • Secure Remote Access
      • Request A Demo
    • Integrations
      • Firewalls
      • Network Access Control
      • SIEM
      • SOAR
      • CMDB
      • OEM
  • Industry Solutions
    • Energy
    • Consumer Products
    • Critical Manufacturing
    • Pharmaceutical
    • Water Utilities
  • Partners
    • Claroty Focus Program
    • Find a Partner
    • Become a Partner
    • Partner Login
  • Resources
    • Biannual Report
    • Case Studies & Use Cases
    • Whitepapers
    • Data Sheets
    • Integration Briefs
    • Support
    • Podcasts
    • Events & Webinars
  • About
    • Leadership
    • Careers
    • Contact Us
    • News
    • Press Releases
  • Blog
  • Team82
  • Contact Us
  • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • Português
    • 中国人
    • 中國人
    • 한국인
  • Why Claroty
  • Products
    • Platform
      • Comprehensive Platform Overview
      • Claroty Edge
      • Continuous Threat Detection
      • Secure Remote Access
      • Request A Demo
    • Integrations
      • Firewalls
      • Network Access Control
      • SIEM
      • SOAR
      • CMDB
      • OEM
  • Industry Solutions
    • Energy
    • Consumer Products
    • Critical Manufacturing
    • Pharmaceutical
    • Water Utilities
  • Partners
    • Claroty Focus Program
    • Find a Partner
    • Become a Partner
    • Partner Login
  • Resources
    • Biannual Report
    • Case Studies & Use Cases
    • Whitepapers
    • Data Sheets
    • Integration Briefs
    • Support
    • Podcasts
    • Events & Webinars
  • About
    • Leadership
    • Careers
    • Contact Us
    • News
    • Press Releases
  • Blog
  • Team82

Aperture Podcast: Dennis Fisher on ‘When Bug Bounties Went Boom’

Share:

 

By Michael Mimoso | September 22, 2021

Bug bounty programs are today a normalized part of information security, but that wasn’t always the case. Researchers who probed software, hardware, web-based applications and more for exploitable vulnerabilities were sometimes met with threats of legal action from vendors, and in some cases, even labeled extortionists.

Relatively quickly, however, during the last 15 years, bug bounty programs are now the accepted norm for compensating legitimate researchers for their work in finding vulnerabilities and coordinating disclosures with affected vendors.

On this episode of the Aperture Podcast, Decipher Editor in Chief Dennis Fisher joins to discuss a three-part series he wrote that goes back in time to the early days of vulnerability research featuring the words of those who laid the foundation for what today is a lucrative industry within information security.

Download this episode of the Aperture podcast here.

The series is a deep dive into how the hackers and researchers who were working hard to find vulnerabilities—often compensated with just an acknowledgment in a security advisory—turned the industry on its head and began to seek out monetary compensation. The pressure they put on the industry turned into some of the first bounty programs at Mozilla and Google. Even Microsoft, which resisted for so long in paying out awards to researchers, eventually paid out some of the biggest bounties on record.

In this episode, you’ll hear more about:

  • How Dennis decided to pursue this story and why he chose to do so in an oral history format
  • The early days of vulnerability research, and the tribulations white-hat hackers faced from vendors and their legal teams
  • How the No More Free Bugs movement started to turn the tide in favor of researchers
  • Vendor-sponsored bug bounties from Mozilla, Google, Microsoft, and many others as well as commercial platforms such as HackerOne, Bugcrowd, ZDI, among others that eventually normalized bounties as an industry
  • The impact of the Hack the Pentagon bounty program
  • The shadowy world of gray markets for vulnerabilities and exploits

Read all three parts of the Decipher series here:

“Lawyers, Bugs, and Money: When Bug Bounties Went Boom, Part 1”
“Uprising in the Valley: When Bug Bounties Went Boom, Part 2”
“Drive it Like You Stole It: When Bug Bounties Went Boom, Part 3”

Subscribe, rate, and review the Aperture podcast on all major platforms, including Apple Podcasts and Spotify.

Share:
Claroty 2022
Terms & Conditions
Privacy Policy

Products

  • Comprehensive Platform Overview
  • Continuous Threat Detection
  • Secure Remote Access
  • INTEGRATIONS
  • Firewalls
  • Network Access Control
  • SIEM
  • SOAR
  • CMDB
  • OEM

Industry Solutions

  • Energy
  • Consumer Products
  • Critical Manufacturing
  • Pharmaceutical
  • Water Utilities

Partners

  • Claroty Focus Program
  • Find a Partner
  • Become a Partner
  • Partner Login

Resources

  • Resource Library
  • Case Studies & Use Cases
  • Data Sheets
  • Integration Briefs
  • Videos & Webinars
  • Whitepapers

About

  • Leadership
  • Careers
  • Contact Us
  • News
  • Press Releases
  • Events and Webinars
  • Advanced Services Terms & Conditions