Discussed Articles
1) Adobe Bug Bounty Experience
Adobe talks about their experience in running a bug bounty program. We go over some of the lessons that they've shared as well as share some of our own.
* https://blogs.adobe.com/security/2016/04/a-vendor-perspective-on-crowd-sourced-penetration-tests.html
2) How Facebook Uses Empathy to Keep User Data Safe
It isn't enough just to offer your customers the right security services, you need to convince them to adopt them. Facebook shares some lessons learned from getting their own customer base to adopt security practices.
* https://hbr.org/2016/04/how-facebook-uses-empathy-to-keep-user-data-safe
* https://news.ycombinator.com/item?id=11596004
* http://adversari.es/blog/2013/06/19/cant-we-all-just-get-along/
* http://darrennegraeff.com/the-importance-of-t-shaped-individuals/
* http://www.amazon.com/Business-People-Speak-Like-Idiots/dp/0743269098
3) Verizon's 2016 DBIR Report
Verizon Enterprise releases their annual Data Breach Investigations Report (DBIR)
* http://www.verizonenterprise.com/resources/reports/rp_DBIR_2016_Report_en_xg.pdf
* https://jacobian.org/writing/2016-dbir-highlights/
* https://blog.osvdb.org/2016/04/27/a-note-on-the-verizon-dbir-2016-vulnerabilities-claims/
* https://twitter.com/dguido/status/725786943737442308
* https://twitter.com/spacerog/status/725350506579648512