Read the Original Article at http://www.informationweek.com/news/showArticle.jhtml?articleID=166403188
A day after rival 3Com's TippingPoint subsidiary announced a scheme to pay researchers for digging up vulnerabilities, iDefense on Wednesday upped the ante by doubling its bug bounties.
The Reston, Va.-based iDefense, which was recently purchased by security giant VeriSign for $40 million in cash, revealed a new payment schedule for its Vulnerability Contributor Program (VCP) on the Full Disclosure security mailing list.
"Effective immediately, we will be doubling our standard pricing structure for vulnerability submissions," wrote Michael Sutton, the director of iDefense Labs in an e-mail to the list.
Like TippingPoint, iDefense doesn't publish a reward rate structure, but instead requires researchers to submit a vulnerability before quoting a bounty.
The company also upped the amounts in its two existing high-profile programs, and opened a new plan geared toward giving bigger rewards to researchers who boost the number of their submissions.
Rewards issued each quarter to the top three vulnerability contributors, for instance, climbed from between $1,000 and $3,000 to between $1,000 and $5,000, while end-of-the-year payouts to the top five doubled. The top contributor to iDefense's VCP will now receive $10,000, for example, while the second-place researcher will get $8,000.
The new Growth program, said Sutton, is designed to reward contributors who stick with iDefense's VCP. Those who double the number of submissions over a previous year, for example, will get a bonus equal to 100 percent of the rewards paid out that year.
Paying for vulnerabilities is a way for research firms to get a competitive edge on rivals, and is increasingly popular among application developers and security vendors. Mozilla Foundation, for instance, pays researchers $500 for each critical flaw found.