CIO Today

CIO Today Network Sites:   Top Tech News  |   CIO Today   |   Mobile Tech Today   |   Data Storage Today
Daily Briefing for Technology's Top Decision-Makers
Friday, April 25th 
Next Generation Data Center Is Here!
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Trending Topics:   Security Heartbleed Big Data Cloud Computing Windows XP Data Centers OS X Mavericks
Home
Enterprise Software
Enterprise Hardware
Big Data
Network Security
Cloud Computing
CRM Systems
Data Storage
Operating Systems
Communications
CIO Issues
Mobile Tech
Chips & Processors
World Wide Web
Business Briefing
After Hours
Press Releases
 
Free Newsletters
Top CIO News
 
Mobile Tech Today
 

Network Security

Microsoft Jumps on Bug-Bounty Bandwagon

Microsoft Jumps on Bug-Bounty Bandwagon
June 20, 2013 1:56PM

Bookmark and Share
"I think this is an intelligent move by Microsoft to tap talent from all over the world, especially in the security space where it's hard to find that talent," said Amol Sarwate, director of Qualys Vulnerability Labs. of its new bug-bounty program. "It also encourages good research to land into the hands of vendors rather than being sold on the black market."

Your Next Generation Data Center Is Here! Vblock™ Systems: the world's most advanced converged infrastructure are built on the Cisco Unified Computing System with Intel® Xeon® processors. Vblock™ Systems deliver extraordinary time to market, ROI and TCO, and flexibility to meet your continually changing demands with 5X faster deployment, 96% less downtime, and 1/2 the cost. Click here to learn more.

Microsoft is getting in on the bug-bounty bandwagon, following in the footsteps of Google and Facebook. The technology giant is asking hackers and researchers to help protect its customers and make its products better in exchange for a pocket full of cash.

"Microsoft is now offering direct cash payments in exchange for reporting certain types of vulnerabilities and exploitation techniques," the company said in its announcement. "Our new bounty programs add fresh depth and flexibility to our existing community outreach programs."

Beginning June 26, Microsoft will launch several bounty programs, including Mitigation Bypass Bounty, the BlueHat Bonus for Defense and the Internet Explorer 11 Preview Bug Bounty. Analysts said the programs are a smart move.

Betting on the Bounty

Under the Mitigation Bypass Bounty, Microsoft will pay up to $100,000 for "truly novel exploitation techniques against protections" built into the latest version of its operating system. Microsoft said learning about new exploitation techniques earlier helps the company improve security by leaps, instead of capturing one vulnerability at a time as a traditional bug bounty alone would. This program is ongoing.

The BlueHat Bonus for Defense program promises up to $50,000 for defensive ideas that accompany a qualifying Mitigation Bypass submission. Microsoft said doing so highlights its continued support of defensive technologies and provides a way for the research community to help protect more than a billion computer systems worldwide. This program is also ongoing.

Finally, the IE 11 Preview Bug Bounty offers up to $11,000 for critical vulnerabilities that affect the browser on the latest version of Windows 8.1 Preview. The entry period for this program will be the first 30 days of the IE 11 beta period. Microsoft said learning about critical vulnerabilities in IE as early as possible during the public preview will help Microsoft make the newest version of the browser more secure.

It's About Time

"I think this is an intelligent move by Microsoft to tap talent from all over the world, especially in the security space where it's hard to find that talent. It also encourages good research to land into the hands of vendors rather than being sold on the black market," said Amol Sarwate, director of Qualys Vulnerability Labs.

"Bug bounty programs are not new and have been implemented previously by Google, Mozilla, PayPal and Facebook to name a few," Sarwate told us. "White market bug bounty programs like HP-Tipping Point's Zero Day Initiative have been around for a few years now. Nevertheless, Microsoft's move is welcome and the prize money certainly trumps other programs."

Tell Us What You Think
Comment:

Name:



 Network Security
1. Fund Seeks To Head Off Heartbleeds
2. Lessons from Verizon's Threat Report
3. Verizon Report Exposes Cyberthreats
4. How Are Web Sites Post-Heartbleed?
5. White House Updating Privacy Policy


Have an informed opinion on this story?
Send a Letter to the Editor.
We want to know what you think.
Send us your Feedback.

 Related Topics  Latest News & Special Reports

  IBM Targets Big Data with Power8 Line
  Opera Coast Offers Safari Alternative
  FCC Defends Internet Traffic Proposal
  Fund Seeks To Head Off Heartbleeds
  Salesforce Developing App SOS Button

 Technology Marketplace
Business Intelligence
Get real-time, cloud-based information services with Neustar.
 
Cloud Computing
Next Generation Data Center Is Here! Vblock™ Systems from VCE
 
Contact Centers
HP delivers the future of the contact center with HP Qfiniti 10.
 
Data Storage
Next Generation Data Center Is Here! Vblock™ Systems from VCE
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Enterprise Hardware
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Hardware
Protect your network with APC Smart-UPS battery backup
 
Network Security
Protect your network with APC Smart-UPS battery backup
 

Network Security Spotlight
Tech Giants Fund Initiative To Prevent Future Heartbleeds
Can more funding prevent Heartbleed vulnerabilities in future open-source software? A new Core Infrastructure Initiative at the Linux Foundation is attempting to find out.
 
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Navigation
CIO Today
Home/Top News | Enterprise Software | Enterprise Hardware | Big Data | Network Security | Cloud Computing | CRM Systems
Data Storage | Operating Systems | Communications | CIO Issues | Mobile Tech | Chips & Processors | World Wide Web
Business Briefing | After Hours | Press Releases
Also visit these Enterprise Technology Sites
Top Tech News | CIO Today | Mobile Tech Today | Data Storage Today

Services:
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About CIO Today Network | How To Contact Us | Article Reprints | Services for PR Pros (In partnership with NewsFactor) | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 CIO Today. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.