To cure their woes, the bug bounty industry should look no further than risk pooling. To cure their woes, the bug bounty industry should look no further than risk pooling. (Photo: Shutterstock)

As the political climate heats up, so does the new era for cyberwarfare. In recent history, nation states supplemented military conflict with attacks on digital infrastructure to either gather intelligence or cause outages, but now with their high impact and versatile usage, there is more reason to include cyber attacks not only before, but during and after conflicts. Actually, there is no reason to stop. In order to maximize effectiveness, cyber attackers target not only government-owned equipment, but banks, transport and infrastructure to cause damage. Securing one set of systems is already a challenge, and now we have a problem of securing an entire nation’s systems.

One place to start is to reward the good guys who find vulnerabilities and report them.

Want to continue reading?
Become a Free
PropertyCasualty360 Digital Reader.


  • All news coverage, best practices, and in-depth analysis.
  • Educational webcasts, resources from industry leaders, and informative newsletters.
  • Other award-winning websites including and

Already have an account?


© 2023 ALM Global, LLC, All Rights Reserved. Request academic re-use from All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.



Join PropertyCasualty360

Don’t miss crucial news and insights you need to make informed decisions for your P&C insurance business. Join now!

  • Unlimited access to - your roadmap to thriving in a disrupted environment
  • Access to other award-winning ALM websites including, and
  • Exclusive discounts on PropertyCasualty360, National Underwriter, Claims and ALM events

Already have an account? Sign In Now
Join PropertyCasualty360

Copyright © 2023 ALM Global, LLC. All Rights Reserved.