The new gold standard attempts to safeguard ethical hackers

- Advertisement -

England (Commonwealth Union)_ Hacking a computer or information system in an ethical or good-faith manner entails looking for security holes so that they may be fixed or improved. Since ethical hacking is becoming seen as a crucial component of comprehensive security policies, many organizations promote activities like bug hunting and penetration testing. The safeguards offered to ethical hackers are often outlined in “safe harbor” declarations that are provided by organized bug bounty programs and ethical hacking platforms.

Hacking a computer or information system in an ethical or good-faith manner entails looking for security holes so that they may be fixed or improved. For its clients, ethical hacking platform HackerOne has released a Gold Standard Safe Harbour (GSSH) statement since hackers may be required to negotiate numerous sets of terms and conditions.

There has never been a more crucial time for organizations to promote positive interaction with ethical hackers, according to Chris Evans, CISO and chief hacking officer at HackerOne. The business thinks that standardized boilerplate would enable these organizations to provide hackers with a condensed but comprehensive and simple standard to work with.

GitLab’s adoption of the standard, according to staff security engineer for application security Dominic Couture, could make ethical hackers’ work easier and expedite the bug bounty process. Since ethical hacking first became a notion, the prospect of punishment has always existed in the field. The UK has made proposals for the Computer Misuse Act to be changed, while the US Department of Justice said earlier this year that it will no longer pursue good-faith security researchers (CMA). The 32-year-old law outlines offenses associated with gaining unauthorized access to a computer and effectively criminalizes many of the methods and approaches frequently employed by ethical hackers. The problem has been promoted by the CyberUp Campaign, which is made up of corporations, non-profit organizations, legal professionals, and other groups working in the field of cyber security.

Hot this week

Hurricane Melissa Leaves Jamaica in Ruins — Could Bermuda and Atlantic Canada Be Next?

A category 5 hurricane has torn into Jamaica, leaving...

Anya Taylor-Joy Leads Tiffany’s Most Romantic Holiday Story Yet

The holiday season has arrived, and upscale jeweler Tiffany...

A New Era for Cancer Detection May Start with a Single Breath

Healthcare (Commonwealth Union) – The registered charity Pancreatic Cancer...

A Coffee Comeback Begins — But Can Profits Keep Up with Costs?

By way of a comeback story, Starbucks has recorded...

From Waste to Watts: Egypt and Italy’s Bold Plan to Turn Farm Leftovers into Power and Prosperity

Egypt and Italy have surreptitiously signed a deal that...
- Advertisement -

Related Articles

- Advertisement -sitaramatravels.comsitaramatravels.com

Popular Categories

Commonwealth Union
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.