Ethical hackers are finally getting their rewards

For too long, the unsung heroes of cybersecurity have been undervalued

Hacking on keyboard

Was 'Phineas Fisher', the black hat hacker who brought Hacking Team to its knees, right when he described himself as an ethical hacker?

Fisher, not his real name, claimed that leaking documents and expropriating money from banks is ethical hacking.

The dictionary definition of 'ethical' is quite clear that it pertains to right and wrong in conduct or being in accordance with the standards for proper conduct within a profession, while to 'hack' is to gain unauthorised access to data. 

So Fisher is half right. Where he's all wrong is in assuming that taking money from banks is proper conduct for an ethical hacker (whether it's morally wrong is a conversation for the pub).

An ethical hacker needs to adhere to certain rules of the game lest they become just another black hat on a mission. Whether that mission is to steal money, deface for political reasons or just 'for the lols' is irrelevant to be honest - black hat is as black hat does.

Fisher went on to make matters worse by suggesting that most ethical hackers are just working to "secure those who pay their high consulting fees" and these are the very people who "are often those most deserving to be hacked".

Most of the ethical hackers I know are driven by one thing, and that's a desire to secure stuff. Yes, the money comes in handy as they also have to live like the rest of us. 

What they do is find the weaknesses before the bad guys can, and they do so using many of the same methods. It's penetration testing Jim, but not as we know it. Yes, there's money to be made too, good money. And about time as well. For far too long the decent money in security has always been on the wrong side of the fence.

How many hackers do you know who are happy wearing a suit, sitting on a board? I can tell you I know very few, over my more than two decades in IT, who have climbed that particular greasy career pole. Nevertheless, the skills of the hacker are just as vital to the enterprise, the business, as the skills of the CISO. They're just undervalued, that's all.

This is why bounty programmes, like Uber's, and an understanding of what ethical hackers do, what they bring to the corporate security posture, are so important. The reward bar has been raised considerably over the last couple of years, and finally hackers who want to improve data security rather than destroy it are seeing a return on their skill investment.

All of this is not attracting black hats into the ethical realm, at least not as far as I can see, but it is preventing grey hats from dropping a few shades and entering the dark side. Surely we can all agree that this has to be a good thing?

Featured Resources

Choosing a collaboration platform

Eight questions every IT leader should ask

Download now

Performance benchmark: PostgreSQL/ MongoDB

Helping developers choose a database

Download now

Customer service vs. customer experience

Three-step guide to modern customer experience

Download now

Taking a proactive approach to cyber security

A complete guide to penetration testing

Download now

Recommended

HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021
Russia launched over a million cyber attacks in three months
hacking

Russia launched over a million cyber attacks in three months

13 Apr 2021
Hackers leak data from dark web marketplace
cyber security

Hackers leak data from dark web marketplace

9 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021
REvil threatens to release Apple’s hardware schematics
ransomware

REvil threatens to release Apple’s hardware schematics

21 Apr 2021