{"id":346,"date":"2025-04-25T14:50:57","date_gmt":"2025-04-25T14:50:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/?page_id=346"},"modified":"2025-04-27T19:46:39","modified_gmt":"2025-04-27T19:46:39","slug":"journal-entry-13","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/journal-entry-13\/","title":{"rendered":"Journal Entry #13"},"content":{"rendered":"\n<p><strong>Summary Reaction to the Use of the Policies in this Article <a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true<\/a><\/strong><\/p>\n\n\n\n<p style=\"font-size:16px\">This study highlights that bug bounty programs are helpful for companies and industries<br>of any size when trying to find security vulnerabilities they might miss at a first glance.<br>Government organizations are encouraging companies to implement vulnerability disclosure<br>policies (VDP\u2019s), but some companies are turning to bug bounty programs where independent<br>researchers are paid to find the bugs in the company&#8217;s system. The researchers say that it is<br>helpful to companies and industries of any size because it doesn&#8217;t matter if it&#8217;s the smallest<br>company or the biggest it doesn&#8217;t affect how many reports they receive. The effectiveness of the<br>programs can vary across different sectors within industries and just because there are new<br>programs, it doesn&#8217;t necessarily reduce reports.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary Reaction to the Use of the Policies in this Article https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true This study highlights that bug bounty programs are helpful for companies and industriesof any size when trying to find security vulnerabilities they might miss at a first glance.Government organizations are encouraging companies to implement vulnerability disclosurepolicies (VDP\u2019s), but some companies are turning to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/journal-entry-13\/\">Read More<\/a><\/div>\n","protected":false},"author":30270,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/pages\/346"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/users\/30270"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/comments?post=346"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/pages\/346\/revisions"}],"predecessor-version":[{"id":410,"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/pages\/346\/revisions\/410"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jlarmercyse-201s\/wp-json\/wp\/v2\/media?parent=346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}