bug-crowd

Cloud Pinup: Bugcrowd – Crowdsourcing Cybersecurity

To Catch a Thief: Crowdsourcing Cybersecurity

There are literally thousands of hackers attacking the Internet on a daily basis. Their sheer numbers, if not the sophistication of any individual attack, makes for a corrosive environment that gradually wears down the security of even the most meticulously designed systems. If there is any vulnerability in the system, sooner or later someone will locate and exploit it.

Private security contractors can be expensive, and in many cases they will not find the holes that later hackers will exploit – not due to any particular lack of competency, but simply because not individual human being can match the hacking power of the crowd.

bug-crowd-home

Bugcrowd, a new startup launched in 2012 by CEO Casey Ellis and CTO Chris Raethke, aims to change this state of affairs by leveraging the power of crowd hacking to help firms shore up their security.

Bugcrowd has a team of over 15,000 “white hat” hackers who have all the same skills as the classic aggressive and criminal hackers. As Bugcrowd’s website puts it, “It takes a crowd to beat a crowd. We have 15,100 good guys who think like bad guys.”

Once this crowd-sourced security analysis process turns up a vulnerability, Bugcrowd provides the tools to seal it up, either by managing the security on its own or providing guidance so that the firm can update its own security. They have a nice list of companies involved in the line of paying for security fixes and this field is expected to grow with the growing demand for such services.

Bugcrowd-Security-1

Current investors include the likes of: Squarepeg CapitalPaladin Capital Group and Icon Ventures

Based on the overall need for this type of service, you can expect good things from them in the near future.

By Gustav Steinhardt

CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information and consultancy services.

Are you a cloud services expert in a world of digital transformation? If so, contact us for information on how to become part of our growing cloud consultancy ecosystem.

CONTRIBUTORS

Cyber Security Tips For Digital Collaboration

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security ...
Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in ...
What Futuristic Transportation Will Look Like In Your Lifetime

What Futuristic Transportation Will Look Like In Your Lifetime

Futuristic Transportation Being stuck in traffic or late for work because of a hold up on the dreaded commute could ...
Principles of an Effective Cybersecurity Strategy

Principles of an Effective Cybersecurity Strategy

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as ...
3 Ways to Protect Users From Ransomware With the Cloud

3 Ways to Protect Users From Ransomware With the Cloud

Protect Users From Ransomware The threat of ransomware came into sharp focus over the course of 2016. Cybersecurity trackers have ...
As Enterprises Execute Their Digital Strategies, New Multi-cloud Landscape Emerge

As Enterprises Execute Their Digital Strategies, New Multi-cloud Landscape Emerge

The Multi-cloud Landscape The digital universe is expanding rapidly, and cloud computing is building the foundation for almost infinite use ...
Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the ...
The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the ...
Countdown to GDPR: Preparing for Global Data Privacy Reform

Countdown to GDPR: Preparing for Global Data Privacy Reform

Preparing for Global Data Privacy Reform Multinational businesses who aren’t up to speed on the regulatory requirements of the European ...
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, ...

NEWS

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

NEW YORK, Dec. 12, 2017 /PRNewswire/ -- Deloitte forecasts double digital growth in machine learning deployments for the enterprise, an increasing worldwide ...
Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system (Reuters) - Hackers likely working for a nation-state recently penetrated the safety system of ...
email as a service

Google Data Analysis, Artificial Intelligence and Predicting Vaccine Scares

Social media trends can predict tipping points in vaccine scares Analyzing trends on Twitter and Google can help predict vaccine ...