Forty-one defense contractors in the small-to-medium-size range participated in a vulnerability disclosure pilot that resulted in 1,015 reports, of which 401 were validated by system owners for…
Staff Sgt. Alek Albrecht participates in a Network War Bridge Course at the 39th Information Operations Squadron Sept. 19, 2014, Hurlburt Field, Fla. Albrecht is practicing to hack into a simulated network to better understand what techniques real hackers may use when attempting to infiltrate Air Force networks. Air Force Space Command provides trained and ready cyber forces to the warfighter through 24th Air Force. Albrecht is a Air Force Network Operations and Security Center enterprise network technician. (U.S. Air Force photo/Airman 1st Class Krystal Ardrey)
It's the "most inclusive" bug bounty program to date, meaning that foreign nationals — except those from China, Russia, Iran or North Korea — are welcome to…
DOD tapped cybersecurity firms Synack, HackerOne and Bugcrowd to provide vetted hackers for continual assessments of defense websites, hardware and physical systems.
The department recently joined the trend of federal bug bounty programs, which boost cybersecurity resources in ways that traditional methods probably can't.
Marines sit at a Joint Tactical Common Operation Picture Workstation, or JTCW. The Marine Corps opened up a bug bounty to find flaws in public facing Marine Corps systems.
"Assets could include closed networks, software-embedded devices, proprietary source code, or other private or internal systems not generally accessible via the public Internet," a new RFI says.