Once vetted, Cook said, the hackers will participate in a controlled, limited-duration program during which they’ll be able to identify vulnerabilities on a predetermined department system. The Pentagon’s bug bounty participants will have to register and submit to a background check before being involved in the program. The pilot is the first in a series of programs designed to test and find vulnerabilities in the department's applications, websites and networks, he added. “The bug bounty program is modeled after similar competitions conducted by some of the nation's biggest companies to improve the security and delivery of networks, products and digital services,” Cook said. “We can't hire every great ‘white hat’ hacker to come in and help us,” a senior defense official said today on a media call, “but allows us to use their skill sets, their expertise, to help us build better more secure products and make the country more secure.”Ĭook said the department will use commercial-sector crowdsourcing to allow qualified participants to conduct vulnerability identification and analysis on the department's public webpages. Today has a directory of 369 such programs offered by everyone from Adobe and Amazon to Twitter and Sony. Jarrett Ridlinghafer, at the time a technical support engineer for Netscape, created the first “bugs bounty” program in 1995, according to the entrepreneur’s website. “Hack the Pentagon” is the first cyber bug bounty program in the history of the federal government, Cook said in a statement issued today.īug bounty programs are offers by software developers and company websites to reward people who report bugs related to vulnerabilities or hacking exploits. The Defense Department is launching a pilot program in April to allow vetted computer security specialists to do their best to hack DoD public web pages, Pentagon Press Secretary Peter Cook said today.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |