Intigriti

Bug Bounty & Agile Pentesting Platform

Edit & Remove Messages

TL;DR Changelog 39: Communication is key  Communicating with others about a bug or vulnerability that has been found and submitted as report is one of the necessary key features for a bug bounty platform. Communication between the relevant stakeholders should be quick, easy and transparent but also provide some assurance about the follow-up and help […]

Continue reading Continue reading

Yahoo’s 1337UP0822 live hacking event rallies researchers from around the world 

After putting in-person live hacking events on hold due to social distancing regulations and travel restrictions, Yahoo made a ground-breaking comeback this month with their 1337UP0822 event. The global media and tech company combined forces with Intigriti to host their first in-person live hacking event in more than two years.  Today, we’re highlighting noteworthy performances […]

Continue reading Continue reading

How CM.com improved its security posture with a bug bounty program

CM.com’s story began in 1999 with the sending of SMS messages to update nightclub and festival visitors. Today, it is a global leader in cloud software for conversational commerce. Sándor Incze is CISO at CM.com—a job that involves ensuring the cybersecurity for all of CM.com’s platform offerings.  Having seen significant improvements in CM.com’s security posture […]

Continue reading Continue reading
Considerations for running an internal bug bounty program

Considerations for running an internal bug bounty program

Internal bug bounty programs only invite employees of the company to participate. Although, sometimes, companies will leverage their internal teams and external security researchers to maximize the skills base doing the testing.  As somebody who successfully set up an internal bug bounty program for a former employer, I’ve already given my take on the benefits […]

Continue reading Continue reading

Visma’s Bug Bounty Program Manager speaks to Intigriti about the practice of running a successful program

Visma is a leading provider of cloud software solutions in Europe and Latin America. With around one million public and private sector customers for their software solutions across the Nordics, Benelux, Central and Eastern Europe, and Latin America, the organization works continuously to maintain a robust security posture. In this interview, we speak to one […]

Continue reading Continue reading
Yahoo live hacking event cover

Meet two hackers heading to Yahoo’s live hacking event, 1337UP0822 

Intigriti’s live hacking events offer a completely different experience to conventional bug bounty hunting. They work by inviting ethical hackers (also known as security researchers and, in this case, bug bounty hunters) to collaborate and connect with a specific organization’s security team, fellow hackers, and of course, Intigriti! Hackers are invited to participate based on […]

Continue reading Continue reading

How to prepare your internal team for launching a bug bounty program

Bug bounty programs are an excellent way for organizations to find and resolve cybersecurity vulnerabilities. However, to maximize success, it’s important to include this essential pre-step: the need to prepare internal teams when launching a bug bounty program launch. To help guide you through the process, this article covers all the steps in getting your […]

Continue reading Continue reading
  • 1
  • 2
  • 3
  • ...
  • 35
  • Next →