What is a bug bounty? What is a bug bounty hunter? What the heck does that have to do with hunting ghosts? These questions beg the bigger question — “Who ya gonna call?” To help us understand what the role of a bug bounty hunter is—what does it take to do this kind of work—and why these ethical hackers do what they do—we are joined by two such hunters: Tommy DeVoss and Ben Sadeghipour.
What is a bug bounty? What is a bug bounty hunter? What the heck does that have to do with hunting ghosts? These questions beg the bigger question — “Who ya gonna call?”
Well, if you are worried about a haunted house, you probably already know the answer to that question. However, if you are building or using software to run your business and—as you should be—are worried about its security, then you should figure out, ASAP, who you can call for the job. No joking here.
In the world of information security, there are many possible answers to this question—but today, we are going to focus on one of them: bug bounty hunters.
To help us understand what the role of a bug bounty hunter is—what does it take to do this kind of work—and why these ethical hackers do what they do—we are joined by two such hunters: Tommy DeVoss and Ben Sadeghipour.
We cover a ton during this conversation, and we have loads of fun and laughs along the way. You don’t want to miss this chat. Have a listen now before it disappears.
Guest(s)
Tommy DeVoss | Ben Sadeghipour
This Episode’s Sponsors:
Bugcrowd: https://itspm.ag/itspbgcweb
Devo: https://itspm.ag/itspdvweb
To see and hear more The Academy content on ITSPmagazine, visit:
https://www.itspmagazine.com/the-academy
Are you interested in sponsoring an ITSPmagazine Channel?
https://www.itspmagazine.com/podcast-series-sponsorships