Articles about Bug Bounty

Partnership agreement with A3SEC

Today we are celebrating because… A3SEC has joined Epic Bounties as a partner.

Read more
What we need to know about CISOS

What we should know about CISOS (Chief Information Security Officer) is a question that is increasing with the evolution of technology and is closely related to security. This is due to the increase of vulnerabilities in companies, which forces them to work to improve the security of their assets and minimise risks.

Read more
5 myths you should know about a bug bounty programme

Nowadays, companies need to find possible vulnerabilities that may exist on their server. This is the purpose of a bug bounty programme. To refresh your memory a little more, we show you our article (internal link - main keys in a bug bounty programme).

Read more
Basics of WAPT (Web Application Penetration Testing)

At Epic Bounties we would like to show you the basic concepts to carry out a WAPT, as well as the different phases that you must execute in order to identify, gather and remediate the different vulnerabilities that your company may have.

Read more
José Palanco, CEO at Epic Bounties

José Ramón Palanco, CEO of Epic Bounties, has a clear objective with the platform: to make Epic Bounties the world’s leading Spanish-speaking platform in the hotly contested market of cybersecurity bug bounty programmes.

Read more
Cybersecurity risk management

Companies are facing continuous attacks on the security of their assets on a daily basis. During the first months of 2020, these attacks increased by 33%. Therefore, in this article we are going to talk about cybersecurity risk management.

Read more
Main keys in a bug bounty program

Bug bounty programs are a pay-for-performance approach to proactive security testing designed to maximize the discovery of high-impact vulnerabilities in organizations.

Read more
Vulnerability disclosure program. Why is it so important for CISOS?

What is a vulnerability disclosure program?

Read more
Three common ways in which organizations are hacked

When it comes to security teams, one of the highest priorities is to reduce risk. An important part of risk reduction is the creation of a cybersecurity risk management strategy.

Read more
Why trust hunters

One of the most common questions we encounter in conversations around bug bounty programs is “Why would I invite hunters to hack my assets?”, “Why should I trust hunters?”, or some variant thereof.

Read more