Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

6/7/2017
06:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Centrify Fortifies Platform Security with Bugcrowd Bug Bounty Program

Centrify to award up to $3,000 per vulnerability to ensure the security of the Centrify Identity Services platform.

SAN FRANCISCO – Centrify, the leader in securing hybrid enterprises through the power of identity, today launched a public bug bounty program with Bugcrowd, the leader in crowdsourced security testing. Building on the success of its private, on-demand program, the public program will leverage more than 50,000 security researchers on the Bugcrowd platform to reinforce the security of the Centrify Identity Services platform. Centrify Identity Services secures each user’s access to apps, endpoints and infrastructure through single sign-on, multifactor authentication and privileged identity management.  

Centrify will reward security researchers between $100 - $3,000 USD per bug identified—depending on impact and severity of vulnerabilities identified in our Application Services, Infrastructure Services and corporate website.

"As a leader in identity services, it is incumbent upon us to fully vet the security on our platform to ensure that each user’s access to apps and infrastructure is secure and that we continue to deliver the best solutions," explains Raun Nohavitza, senior director of IT at Centrify. "Bugcrowd’s platform, organization, experience with triage and relationship with the security community make their bounty program very attractive. With Bugcrowd we’re not only doing the right thing for our security offerings in the best way possible, but we’re also getting consistent administration and management for our ongoing program."

At Bugcrowd security expertise is built into the design, support and management of every program. Bugcrowd’s easy-to-use platform connects organizations with a curated crowd of tens of thousands of researchers for quicker identification of vulnerabilities, while its experienced team manages programs every step of the way to ensure organizations see results.

"The explosion of online business has increased the opportunities for adversaries, which makes a strong security stance more important than ever," said Casey Ellis, CEO and founder of Bugcrowd. "Centrify is clearly demonstrating their commitment to keeping their customers secure by proactively engaging the help of the white-hat hacker community through the Bugcrowd platform. Bug bounty programs have emerged as the most effective and efficient way to secure the delivery of products and services, and we are proud to manage their bug bounty program."

To learn more about Centrify’s public bug bounty program or to participate, visit bugcrowd.com/centrify.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "SpearPhish! Everyone out of the office!"
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10100
PUBLISHED: 2019-07-17
tinymce 4.7.11, 4.7.12 is affected by: CWE-79: Improper Neutralization of Input During Web Page Generation. The impact is: JavaScript code execution. The component is: Media element. The attack vector is: The victim must paste malicious content to media element's embed tab.
CVE-2019-12175
PUBLISHED: 2019-07-17
In Zeek Network Security Monitor (formerly known as Bro) before 2.6.2, a NULL pointer dereference in the Kerberos (aka KRB) protocol parser leads to DoS because a case-type index is mishandled.
CVE-2019-12475
PUBLISHED: 2019-07-17
In MicroStrategy Web before 10.4.6, there is stored XSS in metric due to insufficient input validation.
CVE-2019-13346
PUBLISHED: 2019-07-17
In MyT 1.5.1, the User[username] parameter has XSS.
CVE-2019-13403
PUBLISHED: 2019-07-17
Temenos CWX version 8.9 has an Broken Access Control vulnerability in the module /CWX/Employee/EmployeeEdit2.aspx, leading to the viewing of user information.