Opinions on using your real name for bug bounty or CVE public credit?

Cyber SubReddits
Is learning red team needed to learn blue team?
EC Council CCT exam
Changing location on tinder
SDLC - IDE and IDE extension management
Twilio warns that cybercriminals have accessed Authy phone numbers.
The Fédération Internationale de l'Automobile (FIA), organizer of Formula 1 events, experienced a data breach due to a phishing attack targeting two email accounts belonging to the FIA
Who manages the firewalls at your organization? Security or network teams?
SiegedSec convo logs with Mike Howell from the Heritage Foundation
Mathematically heavy subfields of cybersecurity
Feeling bait and switched
Why do so many Cybersecurity jobs require a TS/SCI?
The President Ordered a Board to Probe a Massive Russian Cyberattack. It Never Did.
Looking for Small Business Feedback on Cybersecurity Solutions
Brute force delay time between attempts
Burp certificate_unknown
Should I get a job before finishing Sec+?
Those in government, what are you using for SAST/DAST/SCA?
FCC Launches $200 Million Cybersecurity Funding for K-12 Schools & Libraries
Intersection of Cybersecurity and Data Visualisation
How can ISSMs be contractors?
The $11 Billion Marketplace Enabling the Crypto Scam Economy
33 million Authy users exposed in authentication apps own security nightmare
I just had soc2 type 2 dumped in my lap. Is this feasible?
Bit nervous about my new job (ISO 27001)
Ticket Heist network of 700 domains sells fake Olympic Games tickets
What are your experiences with cyber security TPRM tools?
Moving to the United States in 4 months and I am not sure how much $$ to ask for
CCIE Enterprise Infrastructure
New Blast-RADIUS attack breaks 30-year-old protocol used in networks everywhere