Specifically, the bug bounty program update focuses on side-channel vulnerabilities, which are akin to Spectre and Meltdown, which came to light earlier this year, following the release research paper that has dinged Intel's reputation in the security community. (See Intel CEO Promises Chips That Fix Spectre & Meltdown Flaws .)
A shift away for an invitation-only program to one that is open to all security researchers, which should increase the pool of those looking for flaws and vulnerabilities in the company's CPUs.
Between now and December 31, Intel will offer rewards of up to $250,000 for information on side-channel vulnerabilities.
An overall increase in the amount of money the company pays in bug bounties, including as much as $100,000 for details about certain vulnerabilities and flaws.
"We believe these changes will enable us to more broadly engage the security research community, and provide better incentives for coordinated response and disclosure that help protect our customers and their data," Rick Echevarria, vice president of Software and Services Group and the general manager of Platforms Security Division, wrote in Wednesday's blog post.
The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth-annual Big Communications Event. There's still time to register and communications service providers get in free!
The specific requirements about how to apply to the bug bounty program and what it takes to collect the bounties can be found on Intel's security site.
Other companies have looked to offer different tools to help mitigate the problems with Spectre and Meltdown. This week, Microsoft Corp. (Nasdaq: MSFT) offered a free update to its Windows Analytics service that allows IT departments to track Spectre and Meltdown updates and issues throughout a PC fleet.
In addition, Microsoft released a security update on Tuesday to fix issues in Outlook, Internet Explorer, Windows, Office, Edge and other products. Redmond also updated the frequently asked questions section of its Security TechCenter site to address issues related to side-channel vulnerabilities.
5G technology holds a good deal of promise for businesses, from expanded IoT capabilities to new ways to reach customers. The downside is that these networks require a new security approach, which InfoSec teams need to start thinking about now.
Over the last year, vulnerable, cloud-based databases have shown that dangers of trusting data to others. However, an exposed government server in Oklahoma proves that attackers can find on-premises data, too.
With the discovery of 'Collection #1,' security researcher Troy Hunt appears to have found the largest repository of stolen email addresses and passwords ever, totaling more than 87GB and 12,000 separate files.
In an era when enterprises are scrambling to keep up with security demands, a new industry survey from ISF finds that having more diverse skills on the InfoSec team is one way to ensure a more stable workforce.
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.