What the Internet Bug Bounty Teaches About Open-Source Software Security

The security platform HackerOne recently announced the latest version of their Internet Bug Bounty (IBB) program. The IBB strives to enhance open-source software security by pooling resources and encouraging security experts (they call themselves hackers) to find flaws in open-source software (OSS).  Now, the program has introduced a new crowd-funding method. This enables more organizations […]

The post What the Internet Bug Bounty Teaches About Open-Source Software Security appeared first on Security Intelligence.

Continue reading What the Internet Bug Bounty Teaches About Open-Source Software Security

Threat Modeling: The Key to Dealing With 5G Security Challenges

With 5G reshaping the smartphone market, 5G security needs to keep up. Almost one in three smartphones sold in the first quarter of 2021 can connect to a 5G network. That’s just one year after the world’s first commercial 5G network emerged in South Korea. Such growth helped annual shipment numbers of 5G-enabled smartphones exceed […]

The post Threat Modeling: The Key to Dealing With 5G Security Challenges appeared first on Security Intelligence.

Continue reading Threat Modeling: The Key to Dealing With 5G Security Challenges