By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Uncover the vulnerability and exploit internally, don’t rely on bug bounties alone
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Enterprise > Uncover the vulnerability and exploit internally, don’t rely on bug bounties alone
EnterpriseInternetSoftware

Uncover the vulnerability and exploit internally, don’t rely on bug bounties alone

Grace Chng
Last updated: August 13, 2020 at 10:31 PM
Grace Chng
Published: September 5, 2019
4 Min Read
SHARE
Katie Moussouris is a pioneer in bug bounty programmes. PHOTO: Katie Moussouris 

Cyber security professionals are often male and white. So it was an interesting experience this week to interview a woman expert, Katie Moussouris, who is adept in vulnerability disclosures and a pioneer in bug bounty programmes.

She believes that bug bounties are good but should only be used as a way to discover the well-hidden vulnerabilities and exploits that in-house security experts cannot find.

A security vulnerability is an error in an IT system that can be exploited by an attacker to compromise the confidentiality or integrity of the system or to deny legitimate user access to a system.

To detect and report the vulnerabilities so that they can be fixed, organisations offer rewards to individuals to report such errors. These are called bug bounty.

Moussouris believed strongly that organisations should not use bug bounties as a lazy way to detect vulnerabilities, at least not before trying to find some of the loopholes themselves.

She was speaking to Techgoondu on the sidelines of the GSEC security conference, organised by Hack in the Box. 

Bug bounty activities of some American tech companies which are offering US$1 million to discover remote exploitation vulnerabilities, she argued, have sent “the wrong signal to their own security teams because they employ engineers and testers to prevent such issues from happening”.

“Why would these professionals who aren’t paid as much, bother to work for any company? They may as well become freelance bug hunters and get the bounty,” she said.

“So to compete with the offense market, companies are in fact, ruining the future pipeline,” she added.

Describing this as perverse incentive, she pointed out the tech companies’ efforts will make it difficult for them to hire the next generation of security professionals to prevent the next generation of exploits.

But many governments, tech companies and organisations are offering bug bounties too. Are they useful?

“They are useful but not as a first step in security,” said Moussouris. “Due diligence is the first step: detect and ferret out the bugs, and eliminate them yourself. Bug bounties may come after that.”

Moussouris is a noted authority on vulnerability disclosure and bug bounties. She is a subject matter expert for the US National Body of the International Standards Organization (ISO) in vulnerability disclosure.

Her own startup, Luta Security, specialises in helping businesses and governments work with hackers to better defend themselves from digital attacks.

Security company Trend Micro pointed out in a report in February 2018 that vulnerability disclosures have been increasing. Citing research from research firm Frost and Sullivan, the report said that vulnerabilities disclosed by public vulnerability reporting agencies totalled 1,522 in 2017, an increase from the 1,262 in 2016.

Ultimately, Moussouris believed that organisations ought to develop special tools that can identify the vulnerabiliites and exploits that have security implications.

She noted: “There are bugs all over IT systems. The challenge is to find those bugs that are most likely dangerous, take them out so that the organisations make the most gains in defence.”

Organisations should also hunker down to software maintenance and patching. The Wannacry ransomware which caused widespread disruption two years ago is still affecting systems because despite repeated public warnings, many servers remain unpatched today.

“I’ve retired for 12 years but I’m still seeing the same bugs. Preventing vulnerability is like dental hygiene – it has to be regular, maintained and become a routine process,” said Moussouris.

StarHub offers cable modem link as backup in 1Gbps fibre plan
Commentary: Trust and data quality critical in self-service BI
First low-end Windows Phone Nokia Lumia 610 lands in Singapore on May 5
Salesforce.com unveils database for the cloud
So, are Singapore’s telecom networks resilient?
TAGGED:bug bountycyber defencecyber securityKatie Moussourisvulnerability disclosure

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Avatar photo
ByGrace Chng
Follow:
A seasoned writer, author and industry observer, Grace was the key tech writer for The Straits Times for more than three decades. She co-founded and edited Computer Times, later renamed Digital Life. She helmed this publication, the de facto national IT magazine, for nearly 19 years. Grace is also the editor and co-curator of Intelligent Island: The Untold Story of Singapore’s Tech Journey, a book highlighting Singapore’s ICT development.
Previous Article Goondu review: Huawei Nova 5T
Next Article After a false start, Samsung Galaxy Fold to be out in Singapore on September 18
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Computex 2025: A glimpse of the machines inside Nvidia’s “AI factories”
Enterprise
May 22, 2025
The three megatrends shaping society and technology
Enterprise Internet
May 21, 2025
Computex 2025: Asus ROG Falcata impresses with ergonomic feel
Gaming PC
May 20, 2025
Computex 2025: To broaden AI footprint, Nvidia offers fast links to third-party chips
Enterprise
May 19, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Join Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?