A Look Inside: Bug Bounties and Pen Testing

Threatpost talks to Christie Terrill of Bishop Fox about the pros and cons of using bug bounty programs versus penetration testing for companies.

As more organizations turn to bug bounty programs, versus penetration testing, to weed out vulnerabilities in their products we ask Christie Terrill, partner at Bishop Fox, what she sees as the pros and cons of either approach.

Threatpost’s Lindsey O’Donnell also asks Terrill what kind of companies are best suited for bug bounty programs versus conducting their own penetration testing? Terrill also addresses what these methods mean for vulnerability disclosures and the legal nuances and complexities behind bug bounty programs.

Suggested articles

Discussion

Leave A Comment

 

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.