Hackers: The third pillar of security

Every business knows that to maintain security, you need the primary pillar: the right employees. Some businesses know that these employees also need the second pillar: the right tools such as Acunetix and Invicti. However, still, not enough businesses know how to deal with hackers and some choose to look the other way.

In the light of the recent two payoffs considered the biggest in history: $ 6M in June and $ 10M in Mayand the increasing threat of cyber-warfarelet’s have a look at why many hackers prefer to work independently and why companies find value in such huge payoffs.

Can I trust a hacker?

The biggest problem that companies have when working with external security experts is trust. The term hacker is still used mostly in a derogatory manner by the media. A lot of people perceive hackers as kids who break into places for fun or as criminals. This could not be farther from the truth and from the original meaning of this word.

Hackers are independent security experts. They are the freelancers of the security world. Instead of working full-time on your internal security team, they prefer to work from their home, for many companies. And more and more companies want to work with them.

Why do security experts choose to freelance?

The worldwide demand for security experts is huge. You would think that everyone who has the right skills and experience should be able to find a good job in this field. However, this is not the situation in every country. Some of the best-skilled hackers come from countries where the IT industry is heavily underdeveloped. To find regular full-time employment, they would have to migrate, often leaving their current life and / or family behind. Many of them are not ready for such a decision, so they prefer to work remotely.

Despite the shift to remote work that happened because of the COVID-19 pandemic, many companies do not offer full-time remote employment because of tax regulations. Instead, they propose permanent B2B contracts where the hacker would have to register in their country of residence as a freelancer. Faced with such a situation, many hackers prefer to freelance for many instead of getting stuck with one client.

Why is bounty hunting difficult?

The world’s largest IT corporations are the most security-conscious. Companies such as Google, Facebook, and Microsoft are fully aware of the value of hackers. They have public-facing vulnerability disclosure policies (VDPs), they have well-managed procedures, they offer substantial bounties, and they pay on time. Working with such a partner is a pleasure but the competition is huge so it’s difficult to score a bounty.

On the other hand, smaller software manufacturers pose a different problem. Most companies have no VDPs in place at all. If freelancers find security problems and contact such businesses, they are sometimes treated in an unpleasant way. This may range from ghosting, through denial, all the way to threats of being reported to the authorities! The fact that such treatment happens at all is very disappointing – it should not be the case in the modern IT world.

The adoption of vulnerability disclosure policies is on the rise but mostly among enterprises. World governments are also among the leaders of adoption. It seems that in this aspect smaller companies have a lot to learn from big organizations.

How to work with hackers?

If you want your assets to be secure and you still do not have a public-facing vulnerability disclosure policy, you might want to rethink your position as soon as possible. The exponential growth of the market means that the demand for IT security personnel will still keep rising. With more and more companies creating VDPs and offering bounties, hackers will have even more incentive to stay independent. All in all, in the future you may have no choice but to work with freelancers because almost nobody in this field and available for work would be interested in full-time employment.

The most important aspect when working with hackers is to understand that their goal is not to harm your business. If it was, they would not be hackers (but criminals) and they would not contact you about a vulnerability (but take advantage of it). Their goal is to earn a living by helping you solve your problems. If you do not treat them right, they will publish the findings anyway and spread the word so other hackers will not touch your product (but criminals will).

Embrace the third pillar

If there were no hackers, there would be no Acunetix and Invicti. There would be no IT security at all. All the best tools on the market were created by hackers and then developed into comprehensive solutions. All the vulnerability scanner manufacturers still need hackers and hire hackers (either as part of their teams or as freelancers) to supply you with new vulnerability detection techniques – we do, too.

That is why Invicti is very passionate about the hacking community and about bringing businesses and hackers together. Our products are designed to help both businesses and freelancers. By automatically detecting vulnerabilities we make it possible for freelancers to focus on new discoveries. By integrating with other systems, we help businesses assess and manage all the vulnerabilities easily.

To have the best security policy possible, use all three pills. Hire the right team to be the core of your internal work. Get Acunetix or Invicti to take the load off that team and make their job much easier. And last but not least, design a public-facing vulnerability disclosure policy to work efficiently with external experts.

THE AUTHOR
Tomasz Andrzej Nidecki
Sr. Technical Content Writer

Tomasz Andrzej Nidecki (also known as tonid) is a Primary Cybersecurity Writer at Invicti, focusing on Acunetix. A journalist, translator, and technical writer with 25 years of IT experience, Tomasz has been the Managing Editor of the hakin9 IT Security magazine in its early years and used to run a major technical blog dedicated to email security.

Source

Every business knows that to maintain security, you need the primary pillar: the right employees. Some businesses know that these employees also need the second pillar: the right tools such as Acunetix and Invicti. However, still, not enough businesses know how to deal with hackers and some choose to look the other way.

In the light of the recent two payoffs considered the biggest in history: $ 6M in June and $ 10M in Mayand the increasing threat of cyber-warfarelet’s have a look at why many hackers prefer to work independently and why companies find value in such huge payoffs.

Can I trust a hacker?

The biggest problem that companies have when working with external security experts is trust. The term hacker is still used mostly in a derogatory manner by the media. A lot of people perceive hackers as kids who break into places for fun or as criminals. This could not be farther from the truth and from the original meaning of this word.

Hackers are independent security experts. They are the freelancers of the security world. Instead of working full-time on your internal security team, they prefer to work from their home, for many companies. And more and more companies want to work with them.

Why do security experts choose to freelance?

The worldwide demand for security experts is huge. You would think that everyone who has the right skills and experience should be able to find a good job in this field. However, this is not the situation in every country. Some of the best-skilled hackers come from countries where the IT industry is heavily underdeveloped. To find regular full-time employment, they would have to migrate, often leaving their current life and / or family behind. Many of them are not ready for such a decision, so they prefer to work remotely.

Despite the shift to remote work that happened because of the COVID-19 pandemic, many companies do not offer full-time remote employment because of tax regulations. Instead, they propose permanent B2B contracts where the hacker would have to register in their country of residence as a freelancer. Faced with such a situation, many hackers prefer to freelance for many instead of getting stuck with one client.

Why is bounty hunting difficult?

The world’s largest IT corporations are the most security-conscious. Companies such as Google, Facebook, and Microsoft are fully aware of the value of hackers. They have public-facing vulnerability disclosure policies (VDPs), they have well-managed procedures, they offer substantial bounties, and they pay on time. Working with such a partner is a pleasure but the competition is huge so it’s difficult to score a bounty.

On the other hand, smaller software manufacturers pose a different problem. Most companies have no VDPs in place at all. If freelancers find security problems and contact such businesses, they are sometimes treated in an unpleasant way. This may range from ghosting, through denial, all the way to threats of being reported to the authorities! The fact that such treatment happens at all is very disappointing – it should not be the case in the modern IT world.

The adoption of vulnerability disclosure policies is on the rise but mostly among enterprises. World governments are also among the leaders of adoption. It seems that in this aspect smaller companies have a lot to learn from big organizations.

How to work with hackers?

If you want your assets to be secure and you still do not have a public-facing vulnerability disclosure policy, you might want to rethink your position as soon as possible. The exponential growth of the market means that the demand for IT security personnel will still keep rising. With more and more companies creating VDPs and offering bounties, hackers will have even more incentive to stay independent. All in all, in the future you may have no choice but to work with freelancers because almost nobody in this field and available for work would be interested in full-time employment.

The most important aspect when working with hackers is to understand that their goal is not to harm your business. If it was, they would not be hackers (but criminals) and they would not contact you about a vulnerability (but take advantage of it). Their goal is to earn a living by helping you solve your problems. If you do not treat them right, they will publish the findings anyway and spread the word so other hackers will not touch your product (but criminals will).

Embrace the third pillar

If there were no hackers, there would be no Acunetix and Invicti. There would be no IT security at all. All the best tools on the market were created by hackers and then developed into comprehensive solutions. All the vulnerability scanner manufacturers still need hackers and hire hackers (either as part of their teams or as freelancers) to supply you with new vulnerability detection techniques – we do, too.

That is why Invicti is very passionate about the hacking community and about bringing businesses and hackers together. Our products are designed to help both businesses and freelancers. By automatically detecting vulnerabilities we make it possible for freelancers to focus on new discoveries. By integrating with other systems, we help businesses assess and manage all the vulnerabilities easily.

To have the best security policy possible, use all three pills. Hire the right team to be the core of your internal work. Get Acunetix or Invicti to take the load off that team and make their job much easier. And last but not least, design a public-facing vulnerability disclosure policy to work efficiently with external experts.

THE AUTHOR
Tomasz Andrzej Nidecki
Sr. Technical Content Writer

Tomasz Andrzej Nidecki (also known as tonid) is a Primary Cybersecurity Writer at Invicti, focusing on Acunetix. A journalist, translator, and technical writer with 25 years of IT experience, Tomasz has been the Managing Editor of the hakin9 IT Security magazine in its early years and used to run a major technical blog dedicated to email security.

Source

More from author

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Related posts

Advertismentspot_img

Latest posts

Multiple Vulnerabilities Discovered in Device42 Asset Management Appliance

A series of vulnerabilities on the popular asset management platform Device42 could be exploited to give attackers full root access to the system, according...

Top 5 best backup practices

Give yourself peace of mind by implementing a new backup strategy with our tips....

Indian Power Sector targeted with latest LockBit 3.0 variant

Estimated reading time: 5 minutesAfter the infamous Conti ransomware group was disbanded, its former members began to target the energy and power sectors...

Want to stay up to date with the latest news?

We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!