cybersecurity ethical hacking Security

Are ethical hackers the digital security answer?

TechRepublic speaks to HackerOne about how ethical hackers are serving to to shrink the broader assault floor of cyber criminals.

ethical hacking billboard.
Image: HackerOne

Modern cybersecurity approaches have advanced as cyberattacks proliferate and discover new refined methods to breach into a corporation. However, regardless of the technological advances, the variety of cyberattacks continues to be at an all-time excessive. According to Check Point Research, assaults elevated by 50% in 2021. The current Vectra Research Security Leaders Report says 83% of organizations surveyed don’t consider conventional approaches can shield them towards trendy threats.

Broader cyberattack floor

Cyberattacks are on the rise resulting from the growth of the assault floor. Driven by the pandemic, the digital acceleration expanded the digital footprint of each group. From the large world cloud migration to tens of millions of distant and hybrid employees operating gadgets past the conventional IT architectures, the augmented assault floor presents cybercriminals with limitless potentialities to seek for vulnerabilities. This means cybercriminals not must compromise extremely guarded digital assets however solely discover the weakest level of entry to a system.

This diversification of the digital surroundings is maybe the greatest problem trendy cybersecurity faces. As cybercrime industrializes, providing ransomware as a service (RaaS), promoting plug-and-play kits that require no technical data, and collaborating with one another, conventional automated cyber security options face a world military of attackers.

HackerOne, a security supplier, has a novel method to answer trendy assault tendencies. They have the world’s largest group of ethical hackers working to remain forward of cybercriminals, occurring the offense, looking for bugs and vulnerabilities earlier than attackers do. Two years in the past, Forbes reported that greater than 700,000 ethical hackers have been already a part of the HackerOneBounty program.

TechRepublic spoke to HackerOne to know how their disruptive method works and the way ethical hackers play a significant function in managing up to date assault surfaces.

“HackerOne Assets puts hackers’ eyes on users’ assets, using the same recon skills they bring to bug bounty programs and pentest engagements,” the HackerOne spokesperson advised TechRepublic.

Many assault floor administration options have the identical shortcomings that scanning instruments do—they cowl a large space however lack context and nuanced understanding. “Because hackers are skilled at finding existing flaws, they also understand which are potentially vulnerable assets,” the spokesperson defined.

“Automated tools lack the human ingenuity and creativity these hackers bring to the vulnerability discovery and triaging process. The only others that match this ingenuity are the criminals that might attempt to infiltrate an organization’s systems,” HackerOne’s spokesperson assured.

SEE: Mobile gadget security coverage (TechRepublic Premium)

High-Velocity Modern App and Cloud Development

Hacker One’s current report reveals that the digital floor of assault continues to develop and impacts infrastructure, software program, apps, updates, gadgets and prolonged provide chains. According to the group, 44% of corporations don’t perceive their assault floor, and solely 33% of apps are examined yearly.

Cloud migration and app growth have grow to be high-risk security fields. “It’s true that organizations create new risks by migrating to the cloud; for example, cloud-based storage services are often exposed to public networks by default and, if not properly secured, data can be easily accessed by attackers,” the spokesperson stated.

HackerOne requires organizations to develop finest practices to make sure that cloud-based software program is securely configured and deployed. “To mitigate risk, organizations should develop a shared responsibility model with their cloud vendor, secure user endpoints, set up backup and recovery solutions for when things go wrong, and perform regular audits and penetration testing on systems,” the spokesperson stated.

According to Enterprise Strategy Group (ESG), organizations face elevated stress to replace security as they remodel enterprise and speed up growth cycles. Cloud companies and cloud-native utility developments are in excessive gear, reaching new ranges of productiveness and innovation, however security gaps start to accentuate.

ESG interviewed organizations that use HackerOne companies to know the assault floor, determine and observe property, implement standardized compliance controls and set up testing processes.

SEE: Password breach: Why popular culture and passwords don’t combine (free PDF) (TechRepublic)

Ethical hackers assist these organizations determine bugs and vulnerabilities and create suggestions loops that permit in-house builders and security groups to be taught from errors. Furthermore, ethical hackers present the assets the vastly outnumbered in-house security groups must match a worldwide cybercriminal group.

“We believe the only way to build a safer internet is by improving the skills, understanding, and transparency between the key players that impact cybersecurity for everyone—including hackers and organizations,” HackerOne’s spokesperson stated.

HackerOne added that extra organizations are starting to acknowledge the advantages of hacking. “The connotation of the term hacker has shifted in the past decade,” in line with HackerOne. The spokesperson defined that the Department of Justice (DOJ) just lately broadened the Computer Fraud and Abuse Act’s definition, lowering the probabilities hackers will likely be prosecuted for good religion analysis.


Leave a Reply

Your email address will not be published.Required fields are marked *