{"id":369,"date":"2023-11-12T23:32:23","date_gmt":"2023-11-13T03:32:23","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/?p=369"},"modified":"2023-11-12T23:32:23","modified_gmt":"2023-11-13T03:32:23","slug":"bug-bounties-and-freelance-hackers","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/2023\/11\/12\/bug-bounties-and-freelance-hackers\/","title":{"rendered":"Bug Bounties and Freelance Hackers"},"content":{"rendered":"\n<p>The use of freelance security researchers in bug bounty markets is a concept which enables companies, both large and small, to benefit from professional resources without employing full-time security staff. The article linked below discusses the background of this process and the findings of a research team that took five and a golf years of data from a bug bounty market to prove my opening statement.<\/p>\n\n\n\n<p>The study stated that, when it was written, there were 4 million vacancies for cybersecurity professionals. Comparatively, in the same year this study was published, there were ~583,000 cybersecurity vacancies in the U.S. and nearly the same in 2023 at ~572,000 vacancies. Although these numbers seem staggering, the topic of the study offers a solution, whether it\u2019s at a big financial company or a small vintage video game store. These bug bounty markets offer an affordable (in a business-sense) mitigation when forced to go without full time security personnel.<\/p>\n\n\n\n<p>This would of course assume that these businesses have a robust vulnerability disclosure policy, or VDP, which protects these freelance security researchers known as hackers and makes it safe for them to report bugs in a company\u2019s code. All companies should have these if they have hackable code; having a VDP is like having a lost and found at hackers convention, it provides people the opportunity to do the right thing.<\/p>\n\n\n\n<p>Though the research cites six significant findings, I will focus on two of them. First, the study validated that the use of bug bounties will benefit a company, whether big or small. Second and lastly, the researchers cite their inability to identify variables which affect hacker supply. I assess that the habitual use of these freelance hackers will help the continued growth of the industry, and perhaps even help to turn the tide on hacker supply.<\/p>\n\n\n\n<p>This, however, is a problem that time is needed to solve. Just like it takes all the right sequence of events to create a truly masterful painting, it needs the same to create a masterful hacker.<\/p>\n\n\n\n<p><a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true\">https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=true<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The use of freelance security researchers in bug bounty markets is a concept which enables companies, both large and small, to benefit from professional resources without employing full-time security staff. The article linked below discusses the background of this process and the findings of a research team that took five and a golf years of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ladler-cyse\/2023\/11\/12\/bug-bounties-and-freelance-hackers\/\">Read More<\/a><\/div>\n","protected":false},"author":26408,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/posts\/369"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/users\/26408"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/comments?post=369"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/posts\/369\/revisions"}],"predecessor-version":[{"id":370,"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/posts\/369\/revisions\/370"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/media?parent=369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/categories?post=369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ladler-cyse\/wp-json\/wp\/v2\/tags?post=369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}