Hacker: The third pillar of security Acunetics

0
18


Every business knows that to maintain security, you need the primary pillar: the right employee. Some businesses know that these employees also need a second pillar: the right tools such as Acunetix and Invicti. However, still, enough businesses do not know how to deal with hackers and some prefer to look differently.

Considered the largest in history in light of the recent two payoffs: M 6M in June And M 10M in MayAnd The growing threat of cyber warfareLet’s take a look at why many hackers prefer to work independently and why companies find value in such huge salaries.

Can I trust a hacker?

The biggest problem for companies when working with external security experts is trust. Terms Hacker It is still mostly used in an abusive manner by the media. Many people see hackers as kids who enter places for fun or as criminals. This is far from the truth and can not be The original meaning of this word.

Hackers are independent security experts. They are freelancers in the security world. Instead of working full time on your internal security team, they prefer to work from home for many companies. And more and more companies want to work with them.

Why do security experts choose freelance?

The global demand for security experts is huge. You would think that everyone with the right skills and experience should be able to find a good job in this field. However, this is not the case in all countries. Some of the best-skilled hackers come from countries where the IT industry is highly underdeveloped. To find regular full-time employment, they need to relocate, often leaving their current life and / or family behind. Many of them are not ready for such a decision, so they prefer to work from a distance.

Despite shifting to remote work due to the COVID-19 epidemic, many companies do not offer full-time remote employment due to tax regulations. Instead, they offer permanent B2B agreements where hackers must register as freelancers in their country of residence. Faced with such a situation, many hackers prefer to do freelance for many instead of getting stuck with one client.

Why is grace hunting difficult?

The largest IT corporations in the world are the most security-conscious. Companies like Google, Facebook and Microsoft are fully aware of the value of hackers. They have a Public-Facing Vulnerability Disclosure Policy (VDP), they have well-managed procedures, they donate enough and they pay on time. It’s a pleasure to work with such a partner but the competition is huge so it’s hard to get a prize.

On the other hand, small software developers create a different problem. Most companies do not have a VDP. If freelancers find security issues and contact such businesses, they are sometimes treated in an unpleasant way. It can range from ghost shows, to denials, to threats to inform the authorities! The fact that this kind of treatment is happening at all is very frustrating – it shouldn’t be in the modern IT world.

Weakness adoption policy adoption is on the rise, but in most initiatives. World governments are also among the leaders in adoption. It seems that small companies have a lot to learn from big companies in this regard.

How to work with hackers?

If you want to keep your assets safe and you still do not have a policy of public vulnerability, you may want to reconsider your position as soon as possible. Index growth in the market means that the demand for IT security personnel will continue to grow. As more companies create VDPs and provide bounties, there will be more incentives for hackers to stay independent. After all, in the future you may have no choice but to work with freelancers because in this case and almost no one available for the job will be interested in a full-time job.

The most important thing when working with hackers is to understand that their goal is not to harm your business. If so, they will not be hackers (but criminals) and will not communicate with you about a vulnerability (but take advantage of it). Their goal is to earn a living by helping you solve your problems. If you don’t treat them right, they will somehow reveal the results and spread the word so that other hackers don’t touch your product (but criminals will).

Embrace the third pillar

If there were no hackers, there would be no Aquinatics and Invicti. There will be no IT security. All the best tools on the market were created by hackers and then developed into a comprehensive solution All vulnerability scanner manufacturers still need hackers and hackers (either as part of their team or as freelancers) to provide you with new vulnerability detection techniques – we do too.

This is why Invicti is very passionate about the hacking community and bringing businesses and hackers together. Our products are designed to help both business and freelancers By automatically identifying vulnerabilities we make it possible for freelancers to focus on new discoveries. By integrating with other systems, we help businesses easily assess and manage all vulnerabilities.

To get the best possible safety policy, use three pillars. Hire the right team to be the core of your internal work. Acunetix or drink Invicti To reduce the burden on that team and make their job easier. And last but not least, design a public-oriented vulnerability policy to work efficiently with external experts.

Author
Thomas Andreas Nideki
Senior technical content writer

Tomasz Andrzej Nidecki (also known as Tonid) is an early cybersecurity writer focusing on Invicti, Acunetix. A journalist, translator, and technical writer with 25 years of IT experience, Tomasz was the managing editor of hakin9 IT Security magazine in his early years and ran a large technical blog dedicated to email security.



Source link