Category: Commentary

We give everyone a voice and we welcome contributions from our friends in the tech world to share their thoughts.

Fine-tuning your hacking skills to land a top job in cybersecurity

Fine-tuning your hacking skills to land a top job in cybersecurity

By: Ben Sadeghipour, Head of Hacker Operations, HackerOne  Ethical hacking is one of the fastest-growing areas in the cybersecurity space: the demand for labour is high, which means it pays handsomely, and the barriers to...

Advertisements
Don't believe these 4 bug bounty myths

Don’t believe these 4 bug bounty myths

By:  Laurie Mercer, Security Engineering Lead at HackerOne Myth #1: Bug Bounty Programs Have to Be Public Public bug bounty programs are a way to publicly demonstrate how secure your products are. “If you don’t...

Will XDR improve security?

By: Jon Clay, Director of Global Threat Communications, Trend Micro (First published on Trend Micro) Cybercriminals and malicious hackers have been shifting their tactics, techniques, and procedures (TTPs) to improve their ability to infiltrate...