Remove Enterprise Remove IBM Remove LAN Remove Program Management
article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer. You can ask questions, and you can talk to the program managers. So I did that.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer. You can ask questions, and you can talk to the program managers. So I did that.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer. You can ask questions, and you can talk to the program managers. So I did that.