OnDemand Conversation | Go Hack Yourself: A Day in Life of an Ethical Hacker
Crowdsourced security has its roots in the bug bounty movement, which emerged years ago. Since then, it's become much more versatile, enhancing numerous security workflows (pen testing, ASM, etc.), and for many adopters, joining the mainstream development lifecycle.
In this webinar, you'll learn:
- About integrating crowdsourcing with your existing dev and security processes
- Modern use cases for crowdsourced security that go beyond bug bounty
- The difference between generalist crowds and curated crowds
- How it contributes to continuous, shift-left security