But, other big companies are still not offering to pay - Apple, Adobe, Microsoft and Oracle are among those. Jerry Bryant, Senior Security Program Manager Lead at Microsoft, had this to say in an email to ThreatPost:
Excepting Google and Mozilla, it seems that researchers must look to third-party vulnerability vendors, government agencies and other buyers if they want to make a buck this way.We value the researcher ecosystem, and show that in a variety of ways, but we don’t think paying a per-vuln bounty is the best way. Especially when across the researcher community the motivations aren’t always financial. It is well-known that we acknowledge researcher’s contributions in our bulletins when a researcher has coordinated the release of vulnerability details with the release of a security update.
While we do not provide a monetary reward on a per-bug basis, like any other industry, we do recognize and honor talent. We’ve had several influential folks from the researcher community join our security teams as Microsoft employees. We’ve also entered into contracts directly with many vendors and sometimes individual researchers to test our products for vulnerabilities before they’re released. Many of these vendors and individuals first came to our attention based on the high-quality and unique approaches demonstrated by the vulnerabilities they reported to the MSRC.
As there are more and more security researchers that are of the opinion that their hard work has a price, it will be interesting to see which side will be the first to give in.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.