Government Security
Network Security Resources

Jump to content

Photo

List Of Bug Bounty & Bug Bounty Program Of The Year

it security security cyber security vulnerability info security cloud
  • Please log in to reply
No replies to this topic

#1 remove

remove

    Private First Class

  • Members
  • 56 posts

Posted 28 August 2014 - 07:16 AM

The "list of bug bounty" impact 345+ international security programs world wide. Commercial programs like bug bounty or reward systems but also regular security acknowledgments. The table list provides 5 item categories. The first list shows the last 5 entries and the second list shows the full list of bug bounty programs Feel free to send us new updates and contribute to the public bug bounty-, security acknowledgment- or reward- programs list.

 

URL: http://www.vulnerabi...ty-programs.php

 

Attached File  2.png   126.25KB   0 downloads

 

Award Nomination of the Best Bug Bounty Program of the Year!

Welcome to the international reward wall of the "Best Bug Bounty Program of the Year". The best bug bounty program of the year is an award which will be nominated by 100 vulnerability-laboratory researchers and 101 public security researchers around the globe. The researchers need a minimum score of 3 bug bounties in any public reward system to vote. 3 judges (administration) of the vulnerability-laboratory will randomly choose the 100 voters in the laboratory and also pick out 101 public security researchers outside of the vulnerability-laboratory. The reward nomination is available to all public verified bug bounty programs & commercial reward systems. The company that wins the competition gets a honorable and unique trophy awarded for the best bug bounty program of the year. The winner of the voting gets an "Eclipse Award Series Cup" in crystal ice with special engraving. Judges: Chokri Ben Achour (TN) , Benjamin Kunz Mejri (DE) & Pim Campers (NL)

 

What is the Best Bug Bounty Program of the Year?

"The best bug bounty program of the year" is a new international nomination through a voting to declare the best public bug bounty program of the year. The nomination and voting takes place during the year and next to the "12-31" every year is the public ceremony. The manufacturer or vendor that wins the competition will cooperate to implement the logo in the bug bounty of the year website. A lucky screenshot/picture of the cup after arrival is at the bottom of the company logo.

 

The award is a neutral reference to the public industry and reflects the independent research of the privat industry. The award and nomination will be forwarded by neutral judges without commercial influence. The result will only become present after all 201 votes has been arrived. The winner company will be announced by the press, partners and connected portals.

 

Characteristics of the "Best Bug Bounty Program of the Year"
The best bug bounty program of the year must have the following characteristics to win the independent sec competition.

- Trustworthiness and reliability in handling with reported security gaps
- Expression and expansion of the public security program service
- Announcement of program updates or policy upgrades
- Cooperative exchange (Researchers & Teams)
- Fast Response to the Research Community
- Good Coordination (Researchers & Teams)
- Reliability of the bug bounty payouts
- Transparency of the program

 

 

 

URL: http://www.vulnerabi...rogram-year.php

 

Attached File  1.png   170.13KB   0 downloads







Also tagged with one or more of these keywords: it security, security, cyber security, vulnerability, info security, cloud