• About
  • Subscribe
  • Contact
Friday, May 9, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home News Stories

Top 4 reasons why your management should look into hacker-powered security

Rena Chua by Rena Chua
January 2, 2020
Photo by Kaique Rocha from Pexels

Photo by Kaique Rocha from Pexels

You know some hackers. They’re smart, driven, creative people. Maybe you used to hack yourself before landing your current gig. The bottom line: You know that bug bounties and other hacker-powered security approaches are a smart investment for anyone looking to build up a security infrastructure. But your higher-ups still need some convincing.

Don’t worry. To best equip you, we’ve put together the following top four reasons your management needs to look at hacker-powered security programs.  

Reason 1: Consistent, effective protection

Hacker-powered security puts a global ethical hacker community on watch, 24/7, for any vulnerabilities your developers, or third party devs whose code you use, may have missed. 

And let’s be clear (because the head of engineering may push back) -- it’s not sloppiness. Your devs are amazing, and they are humans who are asked to add features at an accelerating pace. Bugs happen. Let ethical hackers find them before the criminals do.

Reason 2: Pay for results

Traditional security solutions make you pay up front — usually A LOT — and you pay the same amount regardless of how many bugs they find, or how critical the bugs are.  

With hacker-powered security, organisations pay only for found and validated vulnerabilities, and hackers bring nearly unlimited diversity of skills, approaches, experience, and desired compensation. In other words, organisations get an army of researchers eager to uncover and report bugs of all types and severities. Several of our customers have switched from traditional penetration testing to time-bound bug bounty challenges, in which friendly hackers test designated systems and applications for vulnerabilities over a set period of time. One of the common pieces of feedback we get from customers is that they are getting much better results with bug bounties than traditional pen-testing and at a more cost effective price. 

In fact, in a recent report by Forrester Consulting found that a company switching to hacker-powered security programs for pen-testing stands to save nearly US$300,000 in net present value over three years. 

Reason 3: Start small, grow slow—or fast—and get as big as you need

Everyone from enterprise businesses to startups can benefit from hacker-powered security. Increasingly, enterprise companies are insisting startups put proactive security in place before they do business with them (aka the security questionnaire). 

Counting on a community of 550,000+ ethical hackers has many advantages. Scalability might be one of the biggest. Want to dip your toe in the water? Then start first with a responsible disclosure policy, or a VDP. If your budget is tight, or if you want to evaluate the number and type of reports you’ll get, this is a perfect way to start. With a responsible disclosure policy or VDP, you don’t pay hackers for their reports, so you tend to receive fewer. If your team needs more than that, then you might want to consider using third-party tool like HackerOne Response to coordinate, manage and triage all incoming vulnerability reports. 
As your entire team starts to appreciate the quality and value coming from hackers, and gets used to incorporating the reports into your workflow, it’s easy to switch to a private bounty program. Some 80% of all HackerOne Bounty programs are private. In this type of program, you determine how many hackers to invite and the skills they need to have. This puts you in command of the program cost and the report volume. 

Reason 4: Bug bounty programs are infinitely customisable

It’s easy to calibrate a private bounty program to make sure the number of reports you receive is manageable, both in terms of your team’s time and your budget. Soon, you’ll have a good feel for how changing the program scope, the bounty amounts, and the number of invited hackers changes the report volume. Soon enough, you may decide, as Priceline recently did, that the time is right to launch a public Bounty program. 

There you have it. The top four reasons your management needs to look at hacker-powered security programs. Did we miss something? Please let us know!

Related:  Singapore’s GovTech launches Vulnerability Disclosure Programme with HackerOne
Tags: HackerOnehacking
Rena Chua

Rena Chua

Rena Chua is Bug Bounty Advisor for HackerOne

No Result
View All Result

Recent Posts

  • Study finds almost half of businesses bank on AI-enabled cybersecurity for EDR and XDR
  • AI drives cloud market growth in Q1
  • ARTHALAND chooses OutSystems to advance real estate sustainability
  • Experts warn against AI-powered deepfake impersonation scams
  • Dropbox updates universal search and knowledge management product

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe