Crowdsourced security has its roots in the bug bounty movement, which emerged years ago. Since then, it has become much more versatile, enhancing numerous security workflows (pen testing, ASM, etc.) and for many adopters, joining the mainstream development lifecycle.
In this presentation, you'll learn: - Modern use cases for crowdsourced security that go beyond bug bounty
- The difference between generalist crowds and curated crowds
- How it contributes to continuous, shift-left security
- How to think about integrating crowdsourcing with your existing dev and security processes
|