Among the many ongoing concerns for managers of global has the proliferation on hostile hackers and the dark money that supports and enriches them.

To counter this phenomenon, several “bug bounty” platforms have surfaced, employing their teams of highly gifted and motivated hackers who strike first to thwart a devastating attack.

“We’ve learned from years of breaches and lost trust that we need to get smarter to protect our digitally connected society,” says Mårten Mickos, the chief executive officer of , one of the premier “hacker-powered” security platforms designed to give supply chain managers the ability to resolve critical vulnerabilities before they can be exploited.

HackerOne is headquartered in San Francisco with offices in London, New York, and the Netherlands.

Mickos notes that The Hacker-Powered Security 2018 released last week indicates that “bug bounty” programs in particular are no longer limited to tech companies.

“All supply chains irrespective of industry are vulnerable,” he says.

Indeed, among HackerOne’s clients are the U.S. Department of Defense, U.S. General Service Administration, General Motors, Google, Twitter, GitHub, Nintendo, Lufthansa, Panasonic Avionics, Qualcomm, Starbucks, Dropbox, and Intel.

“HackerOne customers have resolved over 72,000 vulnerabilities and awarded over $30 million in bug bounties,” observes Mickos.
The Hacker Report was based on over 1,700 responses to the 2017 HackerOne Community Survey, including hackers who successfully reported one valid vulnerability, as indicated by the organization that received the vulnerability report.

“Nearly every company has a digital presence that is susceptible to intrusion, and for that reason, businesses outside of the traditional tech realm—like Shopify—have adopted bug bounty programs,” note researchers. Shopify has paid over $850,000 in rewards, resolved 759 vulnerabilities and has an all-time average first response time of just 3 hours and an average resolution time of just 25 days.

“Trying to address this problem dates back to the 1980s,” says Mickos. “But until recently, it had been ad hoc and spontaneous without any pooling of intelligence and resources. Fortunately, we’ve ‘gamafied’ the system and created critical mass to anticipate these supply chain attacks and reduce companies’ exposure while changing the risk landscape.”

About the Author

Patrick Burnson, Executive Editor

Patrick Burnson is executive editor for Logistics Management and Supply Chain Management Review magazines and web sites. Patrick is a widely-published writer and editor who has spent most of his career covering international trade, global logistics, and supply chain management. He lives and works in San Francisco, providing readers with a Pacific Rim perspective on industry trends and forecasts. You can reach him directly at [email protected]

Source link


Please enter your comment!
Please enter your name here