submissions

  1. Meet the BlueHat Content Advisory Board

    We couldn’t do BlueHat without the Content Advisory Board, the brain trust reviewing submissions to the CFP. Representing both Microsoft and other parts of security community, the CAB applies their industry and speaker experience to create the BlueHat agenda that’s the right mix of topics and...
  2. Recognizing Q4 Top 5 Bounty Hunters

    We have tabulated the results from April-June 2018. The Top 5 Bounty Hunters for Q4 are now in. As with our list from Q3, we want to recognize both the leaders in payouts and in number of successful submissions. We appreciate the hard work and dedication of the following individuals and...
  3. Recognizing Q3 Top 5 Bounty Hunters

    Throughout the year, security researchers submit some amazing work to us under the Microsoft Bug Bounty program. Starting this quarter, we want to give a shout out to and acknowledge the hard work and dedication of the following individuals and companies who have contributed to securing...
  4. Inside the MSRC – How we recognize our researchers

    This is the first of a series of blog entries to give some insight into the Microsoft Security Response Center (MSRC) business and how we work with security researchers and vulnerability reports. The Microsoft Security Response Center actively recognizes those security researchers who help us...
  5. Microsoft Bounty Programs Announce Expansion – Bounty for Microsoft OneDrive

    At Microsoft, we continue to add new properties to our security bug bounty programs to help keep our customer’s secure. Today, I’m pleased to announce the addition of Microsoft OneDrive to the Microsoft Online Services Bug Bounty Program. This addition further incentivizes security researchers...
  6. Announcing the Microsoft Bounty Programs

    Over the years, we've put a lot of work into helping secure the computing ecosystem and limiting the number of issues in our products. The security researcher community is critical to these efforts, as they help us find vulnerabilities in our software that we may have missed. Now we're taking...
  7. BlueHat Prize: And the finalists are...

    Hello, The judges have finished reviewing the submissions for the first BlueHat Prize contest and the finalists are in! Please visit Link Removed due to 404 Error for details on the three finalists and their entries that mitigate return-oriented programming (ROP). The finalists will collectively...
  8. Countdown to Defensive Security Innovations Competition: Final Submission Days!

    Nearly nine months after we announced the first annual Link Removed due to 404 Error competition for innovations in defensive security technologies, we’re just days away from the submission deadline. On the EcoStrat blog today, Senior Security Strategist Katie Moussouris gives a glimpse...
  9. BlueHat Prize Q&A with Katie Moussouris

    Hi everyone, Black Hat this year was really great. We spent a lot of time talking to people and getting new perspectives on the security landscape and of course, we announced the BlueHat Prize contest. The reaction to the contest was outstanding. In fact, within the first 24 hours, we had...