The US Division of Defense (DoD) has launched a internet site to accompany its Hack the Pentagon (HtP) application.
The Chief Digital and Artificial Intelligence Office environment (CDAO) Directorate for Digital Solutions (DDS), Craig Martell, unveiled the web site past Thursday. It will be a source for DoD companies, vendors and security scientists to recognize how to perform a bug bounty.
The web page will also permit partnerships with the CDAO DDS workforce to aid and participate in DoD-broad bug bounties.
“With the HtP web site launch, CDAO is scaling a extended-working plan, which traditionally presented services on a job-by-job basis, by giving the Section improved access to lessons uncovered and greatest procedures for hosting bug bounties,” Martell explained.
“The web page will help equip DoD to run constant bug bounties as part of a bigger detailed cybersecurity strategy.”
Read through far more on the HtP application here: US to Start 3rd Iteration of ‘Hack the Pentagon’ Bug Bounty Plan
The DDS also explained that, outside of its instructional needs, the new internet site also aims to engage and recruit specialized talent.
“Through Hack the Pentagon, we’re developing a global talent pipeline for cybersecurity authorities to add to our national protection exterior of common federal government profession paths,” commented Jinyoung Englund, acting director of CDAO DDS.
According to a website publish printed by the Directorate previous Thursday, Hack the Pentagon has supported above 40 bug bounties considering that its start in 2016. Far more than 1400 moral hackers participated in these applications and have collectively found roughly 2100 vulnerabilities.
The next iteration of the Hack the Pentagon application was unveiled in 2018. The DDS became section of the CDAO business in June 2022.
The launch of the new Hack the Pentagon site comes months after the DoD updated its CMMC 2. software. The alterations were talked about in a recent guest put up on Infosecurity by Matthew Hodson, CIO of Valeo Networks.
Some parts of this article are sourced from:
www.infosecurity-journal.com