2018/03/08 : Dennis Fisher gives us an Oral History of the LØpht in four parts. This is the third part, when "[p]ieces in The Washington Post, Wired, and many other outlets raised the group's profile and brought its work to the attention of people far outside the hacker...Read more
2005 : "Part One of this paper explains the current state of computer (in)security and sets forth three ways to restrict publications followed by the most common arguments for and against. It then illustrates the popularity of security publication restrictions with an ...Read more
2014/06 : "The Industry Consortium for Advancement of Security on the Internet, ICASI, proposed to the FIRST Board of Directors that a Special Interest Group (SIG) be considered on Vulnerability Disclosure. After holding meetings at the FIRST Conferences in Boston in June 2014...Read more
2017/01/20 : Omar Santos writes about the new FIRST Guidelines and Practices for Multi-Party Vulnerability Coordination and Disclosure.
This artifact is part of the FIRST Vulnerability Disclosure Bundle...Read more
2014/08/06 : Here is the transcription of Dan Geer keynote at the Black Hat Conference of 2014. He explains how vulnerability research should now be recognized as a job and not a hobby anymore. It must be paid.
This artifact is part of the ...Read more
2010/07/22 : "Today on the MSRC [Microsoft Security Response Center] blog, Matt Thomlinson, General Manager of Trustworthy Computing Security, announced our new philosophy on Coordinated...Read more
2008/08 : Microsoft create the Microsoft Vulnerability Research Program (MSVR).Read more
2019/04/08 : In this document, Foudil and Shafranovich "define a format ("security.txt") to help organizations describe the process for security researchers to follow in order to report security vulnerabilities."
Read more
2013/06/19 : Microsoft decided to create new bounty program.
This artifact is part of the Microsoft Vulnerability Disclosure Bundle.Read more
2007/03/26 : Ryan Naraine writes about the PWN to OWN contest.
"At this year's CanSecWest 2007 conference in Vancouver, BC, a "PWN to OWN" contest will pit security researchers against a MacBook Pro in an experiment to see how well a default Mac OS X install can survive...Read more
2017/08/15 : Publication of the CERT Guide.
"The guide provides an introduction to the key concepts, principles, and roles necessary to establish a successful CVD process. It also provides insights into how CVD can go awry and how to respond when it does so...Read more