000 02558nam a22002417a 4500
003 OSt
005 20250513145724.0
008 250513b |||||||| |||| 00| 0 eng d
020 _a9781119782568
024 _2doi
_a10.1002/9781119782568
040 _aTUPM
_beng
_cTUPM
_dTUPM
_erda
100 _aJackson, John.
_eauthor.
245 _aCorporate cybersecurity :
_bidentifying risks and the bug bounty program /
_cJohn Jackson.
_hebook
336 _2rdacontent
337 _2rdamedia
338 _2rdacarrier
504 _aIncludes bibliographic references and index.
520 _aCORPORATE CYBERSECURITY An insider’s guide showing companies how to spot and remedy vulnerabilities in their security programs A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program. Written by a cyber security expert, the book is filled with the information, guidelines, and tools that engineers can adopt to sharpen their skills and become knowledgeable in researching, configuring, and managing bug bounty programs. This book addresses the technical aspect of tooling and managing a bug bounty program and discusses common issues that engineers may run into on a daily basis. The author includes information on the often-overlooked communication and follow-through approaches of effective management. Corporate Cybersecurity provides a much-needed resource on how companies identify and solve weaknesses in their security program. This important book: - Contains a much-needed guide aimed at cyber and application security engineers - Presents a unique defensive guide for understanding and resolving security vulnerabilities - Encourages research, configuring, and managing programs from the corporate perspective - Topics covered include bug bounty overview; program set-up; vulnerability reports and disclosure; development and application Security Collaboration; understanding safe harbor and SLA Written for professionals working in the application and cyber security arena, Corporate Cybersecurity offers a comprehensive resource for building and maintaining an effective bug bounty program.
650 _aEbook
650 _aCybersecurity
856 _uurl
_yWiley Online Library
942 _2lcc
_cREF
_n0
999 _c29804
_d29804