Date: 2018-08-21 12:07:31Computing Computer security Internet security Information Age Information and communications technology HackerOne Computer viruses Bug bounty program Hacker culture Security hacker Hacker Katie Moussouris | | ZOMATO’S HACKER-FOCUSED APPROACH TURNS THE TABLES ON SECURITY VULNERABILITIES Connecting eaters with restaurants is Zomato’s main business, so they took a hospitable approach to hackers, driving engagement and qualitAdd to Reading ListSource URL: www.hackerone.comDownload Document from Source Website File Size: 2,20 MBShare Document on Facebook
|