Read this article https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=trueLinks to an external site. and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
This article addresses the growing concerns of companies and their cyber vulnerabilities, especially in large companies. Seeing as the branch is relatively new, companies have taken some time to create proper protocols for their online security. This article has found that a good solution to giving companies exposure to their cyber vulnerability is by having bug bounties. By having bug bounties, it allows a way for many hackers to view the company’s programs and point out the bugs and potential safety weaknesses. This not only helps the companies but also the hackers because it allows the companies a chance to look at their work and help the job or freelance pool of more than capable workers. The resistance to this is a lack of testing and time.