![]() Yet, the policy debates that shape the legal environment around vulnerability disclosure often fail to consider cybersecurity as a function of both the supply of vulnerability research and the health of those research communities. They find and disclose critical vulnerabilities, often responsibly, while working outside affected vendors or codebases. Making law for vulnerability disclosureĪppendix III: Null finding charts Executive summaryĬybersecurity, writ large, benefits enormously from an international community of researchers, hackers, and bug hunters.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |