Thursday, February 23, 2023
HomeCyber SecurityWhy Bug-Bounty Applications Are Failing Everybody

Why Bug-Bounty Applications Are Failing Everybody

It has been a couple of decade for the reason that hype for bug-bounty applications first began going supernova, however the jury continues to be out on the effectiveness of them. In accordance with Katie Moussouris, founder and CEO of Luta Safety, the common group struggles to squeeze significant safety outcomes from bug bounties, and proceed to wrestle with execution.

Bug-bounty applications are definitely extra mainstream than ever, with bounties well-liked at excess of simply the big-name tech corporations now. Product safety and enterprise cybersecurity professionals at a rising vary of organizations more and more flip to such applications to behave as an software safety backstop, typically fueled by the comfort and gross sales machine of the rising bug-bounty platform market.

However whereas many organizations might begin out sturdy with their bug-bounty applications, “at in regards to the 18-month to two-year mark they begin to collapse below their very own weight,” Moussouris tells Darkish Studying.

This collapse is often heralded by overwhelmed, overworked program managers at these corporations who’re unable to maintain up with the quantity of bugs submitted by bounty hunters, in addition to software program that also stays riddled with vulnerabilities and sometimes plagued with essentially the most primary of safety flaws.

“I can inform you that bug bounties have been an excellent thought poorly executed for the final decade or so,” says Moussouris, who will likely be discussing the challenges in a chat scheduled for Thursday, August 11 at Black Hat USA, “Bug Bounty Evolution: Not Your Grandson’s Bug Bounty.”

“I feel that there is room for a ton of enchancment, not simply in how bug bounties are designed and executed, but additionally within the holistic image of the ecosystem wherein a bug bounty operates,” she mentioned.

One of many massive systemic points is the truth that many bug-bounty applications are applied no matter the maturity of the underlying cybersecurity program’s practices. Meaning asset visibility, vulnerability administration, developer coaching, and extra, says Moussouris. Whereas bug bounties could also be an excellent complement to a strong base of application-security practices, some organizations mistakenly imagine they will rely solely on the bounties to maintain their software program protected.

“From our perspective, we wish to say no ‘bug-bounty Botox.’ We would like you to be fairly on the within,” says Moussouris. “We would like organizations to be not simply ready to repair the bugs thrown over the fence in a vuln-disclosure program or bug-bounty program, however to be truly taking a look at their core safety investments. [They also need to be] utilizing bug-bounty applications as an indicator of well being of their general safety program. As a result of if you concentrate on it, each bug is a symptom of an underlying dysfunction of their safety system.”

Design Bug Bounties for Good Safety Outcomes

Moussouris says that the difficulty is a “systems-dynamic drawback at its core.” At Black Hat, she plans to discover suggestions on how safety groups can design their holistic program to make use of bounties in order that they create the deliberate safety outcomes they need and which could be demonstrated in a significant and measurable method.

In the end, she believes a bug-bounty program should not simply spotlight the low-hanging fruit that may be found from conventional software safety practices, but additionally present incentives for surfacing the advanced, hard-to-find, and harder-to-exploit flaws.

Higher Bug-Bounty Applications for Hunters

Moussouris says her speak may also sort out the flip aspect of the bug-bounty ecosystem — specifically the truth that the system would not serve bug-bounty hunters very nicely both.

“It is just like the worst gig financial system job you would presumably get,” she explains. “Worse than an Uber or Lyft job, since you receives a commission with each gig that you just take with Uber and Lyft; you don’t receives a commission for each single bug you discover in case you are a bug-bounty hunter. So each side of this market have been achieved improper by the commercialization because it at the moment exists.”

Ancillary to that, she’ll discover what the safety world must do to broaden {the marketplace} for safety labor, together with taking a deep dive into apprenticeship fashions and constructing a pipeline for growing expertise and training round vulnerability remediation and software safety resilience.


Most Popular