Muscat: Vodafone in Oman has issued a challenge to local and international ethical hackers to put its cyber security to the test through a bug bounty programme. The first of its kind in the Sultanate, managed and executed in collaboration with HackerOne, the programme has set rewards of up to OMR 5,000 for identified vulnerabilities.
Detailed information including rules of engagement, participation criteria and qualifying vulnerabilities are available on the website https://vodafone.om/report-a-vulnerability. All hackers are required to register on HackerOne’s bug bounty page https://hackerone.com/users/sign_up as well as confirm their interest by sending their name, date of birth and HackerOne ID via email to [email protected]
The cyber security landscape is continually shifting. The scale, frequency and variety of cyberattacks continue to grow, as hackers become increasingly sophisticated. Adopting a proactive approach to cyber readiness and resilience, Vodafone in Oman is breaking away from the traditionally defensive strategy to one that is inclusive and collaborative.
“This latest initiative will not only allow us to demonstrate and reinforce our cyber security capabilities but will open new doors of collaboration and nurture a solutions-driven relationship between Vodafone and the wider community of cyber security experts, ethical hackers and technology enthusiast,” said Jaifar Al Mamari, Head of Cyber Security at Vodafone in Oman. “
“As a technology company, we are as strong as our weakest link. Research shows that new security challenges primarily stem from increased adoption of technologies such as cloud services, IoT devices and remote working. We acknowledge these evolving threats and instead are harnessing cyber security to drive our growth, trust, and customer satisfaction.”
In line with international best-Vodafone-practices, Vodafone in Oman integrates cyber security readiness as part of every aspect of its operations and resources, starting with managing the knowledge gap on digital footprint between the company and its teams. The company also continuously reviews and assess its security policies and strategies ensuring that it is forever, identifying, containing, recovering and learning from threats and attacks.