
Sign up to save your podcasts
Or
Bug bounties. They’re an important security tool in the arsenal of many tech companies. Here’s how they work. Give ethical hackers the chance to probe your systems for weaknesses, pay them for exploits they find and fix said exploits before ne’er-do-wells find and use them. Bounty programs vary from company to company. Marketplace’s Jed Kim speaks with Reed Albergotti, a tech reporter for The Washington Post who wrote about widespread dissatisfaction with how Apple pays its bounties and the ways it limits communication about the bugs hackers find — all problems that may hurt security for Apple users.
4.5
12361,236 ratings
Bug bounties. They’re an important security tool in the arsenal of many tech companies. Here’s how they work. Give ethical hackers the chance to probe your systems for weaknesses, pay them for exploits they find and fix said exploits before ne’er-do-wells find and use them. Bounty programs vary from company to company. Marketplace’s Jed Kim speaks with Reed Albergotti, a tech reporter for The Washington Post who wrote about widespread dissatisfaction with how Apple pays its bounties and the ways it limits communication about the bugs hackers find — all problems that may hurt security for Apple users.
1,647 Listeners
903 Listeners
4,358 Listeners
1,753 Listeners
8,659 Listeners
30,839 Listeners
1,358 Listeners
32,283 Listeners
2,171 Listeners
5,497 Listeners
1,438 Listeners
9,568 Listeners
10,141 Listeners
3,585 Listeners
6,259 Listeners
163 Listeners
2,743 Listeners
1,319 Listeners
90 Listeners