Sign in to follow this  
chain

Singapore has announced the third bug bounty program aimed at assessing the security of government systems exposed online.

The government of Singapore has announced its third bug bounty program aimed at assessing the level of security implemented for government systems exposed online.

The bug bounty program sees the involvement of the Cyber Security Agency of Singapore (CSA) and the Government Technology Agency of Singapore (GovTech).

Like previous programs, this bug bounty initiative program will be operated through the HackerOne platform.

The bug bounty program will run from July to August and will see the participation of 200 international hackers and 100 local hackers. The organization will offer payouts between $250 and $10,000 for each vulnerability reported by the experts.

The Government will present the results of the program in September.

“The Singapore Government’s latest bug bounty program is part of a strategic initiative and commitment to build a secure and resilient Smart Nation by strengthening collaboration with the cybersecurity industry and community.” reads the press release. “GovTech’s bug bounty program will run from July to August 2019 and will cover nine Internet-facing government digital services and information and communication technology systems with high user interaction.”

Singapore bug bounty

In December 2017, Singapore’s Ministry of Defence (MINDEF) invited roughly 300 white hat hackers from around the world to participate its first bug bounty program. The hackers found 35 vulnerabilities that were paid a total of $15,000.

The second program run earlier in 2019 and resulted in the discovery of 26 security flaws that were paid a total of $12,000.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

Sign in to follow this