© 2017 Ablative Security LLC

Follow Us

February 20, 2017

The Bug Bounty movement grew out a desire to recognize independent security researcher efforts in finding and disclosing bugs to the vendor. Over time the movement split into those that demanded to be compensated for the bugs they found and third-party organizations th...

January 24, 2017

In this part we’ll discuss why an organization needs to launch a bug bounty program, and what limits the value they will likely extract from such an investment.

January 9, 2017

Threat actor attribution in the cyber world – when done properly – is a damned difficult task complicated by missing and inaccessible traffic logs, international jurisdictions, and routing through anonymizing proxies and compromised hosts scattered around the globe. Un...

Please reload

  • Twitter Basic Square
  • RSS Social Icon
  • LinkedIn Social Icon