Concepedia

Publication | Closed Access

Bug Bounty Programs for Cybersecurity: Practices, Issues, and Recommendations

49

Citations

13

References

2019

Year

Abstract

Drawing upon crowdsourcing, bug bounty programs (BBPs) are entering the mainstream security practice in organizations. We analyze and recommend best practices in five main BBP areas: scoping of BBPs, timing of crowd engagement, submission quality, firm-researcher communication, and hacker motivation.

References

YearCitations

Page 1