{"id":256,"date":"2024-11-24T08:30:08","date_gmt":"2024-11-24T08:30:08","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/?p=256"},"modified":"2024-11-24T08:30:08","modified_gmt":"2024-11-24T08:30:08","slug":"week-13-read-the-article-and-write-a-summary-reaction-to-the-use-of-the-policies-in-your-journal","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/2024\/11\/24\/week-13-read-the-article-and-write-a-summary-reaction-to-the-use-of-the-policies-in-your-journal\/","title":{"rendered":"WEEK 13: Read the article and write a summary reaction to the use of the policies in your journal."},"content":{"rendered":"\n<p>This article talks about how important it is for companies to have vulnerability disclosure<br>policies, which are rules that let outside researchers report security problems without fear of<br>being sued. Many companies don\u2019t have these rules, so security researchers are often afraid to<br>share what they find. This means companies might not know about weaknesses in their systems.<br>But things are changing. After big cyberattacks, experts like Rod Rosenstein and the US<br>Department of Homeland Security have encouraged companies to have VDPs to help improve<br>security.<br>The article also mentions bug bounty programs, where companies pay hackers to find security<br>problems. These programs are becoming more popular, with platforms like HackerOne and<br>Bugcrowd paying millions of dollars to researchers. More and more companies are starting to<br>use these programs, and experts expect that by 2022, half of all companies will use outside<br>researchers to find security issues. Even though some companies were slow to adopt these<br>policies, the growth of bug bounty programs shows that more businesses are realizing how<br>important it is to work with experts to fix security problems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article talks about how important it is for companies to have vulnerability disclosurepolicies, which are rules that let outside researchers report security problems without fear ofbeing sued. Many companies don\u2019t have these rules, so security researchers are often afraid toshare what they find. This means companies might not know about weaknesses in their systems.But&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nietocyse201s\/2024\/11\/24\/week-13-read-the-article-and-write-a-summary-reaction-to-the-use-of-the-policies-in-your-journal\/\">Read More<\/a><\/div>\n","protected":false},"author":25891,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/posts\/256"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/users\/25891"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/comments?post=256"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/posts\/256\/revisions"}],"predecessor-version":[{"id":257,"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/posts\/256\/revisions\/257"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/media?parent=256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/categories?post=256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/tags?post=256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}