{"id":20310,"date":"2022-02-09T01:00:00","date_gmt":"2022-02-09T01:00:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2022\/02\/09\/demand-for-crowdsourced-security-booms-yeswehack-bug-bounty-platform-continues-to-thrive\/"},"modified":"2022-02-09T01:00:00","modified_gmt":"2022-02-09T01:00:00","slug":"demand-for-crowdsourced-security-booms-yeswehack-bug-bounty-platform-continues-to-thrive","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2022\/02\/09\/demand-for-crowdsourced-security-booms-yeswehack-bug-bounty-platform-continues-to-thrive\/","title":{"rendered":"Demand for crowdsourced security booms: YesWeHack bug bounty platform continues to thrive"},"content":{"rendered":"<p> \n<\/p>\n<div lang=\"en\">\n<p>PARIS, FRANCE and SINGAPORE &#8211;\u00a0<a href=\"https:\/\/www.media-outreach.com\/\" rel=\"sponsored\">Media OutReach<\/a>\u00a0&#8211;\u00a09<br \/>\nFebruary 2022\u00a0&#8211;<b>\u00a0<\/b>YesWeHack, Europe&#8217;s leading Bug<br \/>\nBounty platform, today announced strong growth, with its annual revenue more<br \/>\nthan doubling globally. In Asia, YesWeHack revenue grew by a substantial 200%.<\/p>\n<p>YesWeHack&#8217;s<br \/>\ncommunity of ethical hackers has grown by 75%, with over 35,000 hackers now<br \/>\noperating on the platform. On average, 1,200 to 1,300 researchers join<br \/>\nYesWeHack each month. This ever-growing popularity confirms it as the preferred<br \/>\nplatform for ethical hackers looking for Bug Bounty programs.<\/p>\n<p>It<br \/>\nwas also a successful year for international expansion, with YesWeHack<br \/>\nestablishing META presence and helping businesses in over 40 countries to<br \/>\nimprove their security posture across the globe.<\/p>\n<p><b>Vulnerability minefield<\/b><\/p>\n<p>The past 12<br \/>\nmonths saw a record-breaking year for vulnerabilities. YesWeHack noted a<br \/>\ndoubling in the number of bugs identified by its hackers. Of these, 35% were<br \/>\nconsidered &#8216;critical&#8217; or &#8216;high&#8217;, meaning many business systems and applications<br \/>\ncould have been severely impacted if these bugs were not found and remedied.<\/p>\n<p>The increasing number and impact<br \/>\nof vulnerabilities discovered in 2021 such as SolarWind and Log4J has led<br \/>\ncompanies to intensify their investments in crowdsourced security. In 2021, the<br \/>\nonline aggregator FireBounty.com, created by YesWeHack, counted a total of<br \/>\nnearly 24,000 vulnerability disclosure policies.<\/p>\n<p>In terms of the type of<br \/>\nvulnerabilities detected, implementation and design flaws (Secure Design,<br \/>\nAccess Control) remain the leading type of bugs for the second year in a row.<br \/>\nThis trend can be explained by the increasing complexity of the applications<br \/>\ndeployed.<\/p>\n<p><b>Adoption by sector<\/b><\/p>\n<p>The adoption of Bug Bounty<br \/>\nprograms continues to grow across several industries with YesWeHack seeing a<br \/>\n100% increase in the number of active programs available on its platform.<\/p>\n<p>Unsurprisingly, technology<br \/>\ncontinues to be the most prominent sector for YesWeHack. It represents 44% of<br \/>\nall programs on the YesWeHack platform, up from 35% last year. This is followed<br \/>\nby the financial services and insurance sector, which accounted for 18% of all<br \/>\nBug Bounty programs on the platform in 2021.<\/p>\n<p>As the pandemic continues to<br \/>\ndisrupt the world, many other sectors have also accelerated their digital<br \/>\ntransformation journey to meet the changing needs of their users. This is<br \/>\nespecially relevant in the public sector, where many administrations and local<br \/>\nauthorities are continuing to digitise their services and have therefore<br \/>\nlaunched Bug Bounty programs to protect their data.<\/p>\n<p><b>Record year for rewards<\/b><\/p>\n<p>Alongside the increase in programs<br \/>\non its platform, YesWeHack has seen a 140% year-on-year growth in the total<br \/>\namount of rewards paid out to hackers.<\/p>\n<p>In 2021, the largest payout<br \/>\namounted to \u20ac40,000. Last year also saw YesWeHack release the Swiss Post e-voting public bug bounty program,<br \/>\noffering the platform&#8217;s largest ever reward available to its hacker community<br \/>\nat \u20ac230,000. <\/p>\n<p>One of the reasons for YesWeHack&#8217;s<br \/>\ngrowing popularity, among ethical hackers and customers alike, is its ongoing<br \/>\ncommitment to the smooth running and quality of its programs. For example, in<br \/>\n2021, 78% of vulnerabilities were rewarded within 24 hours of being accepted,<br \/>\nwhile 89% were paid within 28 days of submission and 60% of vulnerabilities<br \/>\nwere remediated within a month.<\/p>\n<p><b>Crowdsourced security will continue to grow <\/b><\/p>\n<p>Romain Lecoeuvre, CTO and<br \/>\nco-founder of YesWeHack, warns that the acceleration of digitalisation induced<br \/>\nby the pandemic should not lead companies to relax their security efforts.<br \/>\n&#8220;Many developers are under pressure to deliver applications as quickly as<br \/>\npossible in order to maintain or gain a competitive advantage. As a result,<br \/>\nspeed is prioritised over security. For this reason, it is essential that<br \/>\ndevelopment and security teams work in tandem, with the help of ethical<br \/>\nhackers, to engage in a DevSecOps-like approach.&#8221;<\/p>\n<p>Guillaume Vassault-Houli\u00e8re, CEO<br \/>\nand co-founder of YesWeHack, notes that crowdsourced security is a great way<br \/>\nfor companies to get into data privacy compliance. &#8220;Over the years, the<br \/>\ngeneral public has become more and more sensitive to how to protect their data.<br \/>\nIn the interests of transparency, many organisations are now working with<br \/>\nethical hackers to find vulnerabilities in their systems, and to provide<br \/>\nassurances to their users. Indeed, unauthorised access to personal data is one<br \/>\nof the main risks identified in the programs available on our platform and has<br \/>\ntraditionally offered the highest rewards. In this context, crowdsourced<br \/>\nsecurity is not only the most effective way to discover vulnerabilities in<br \/>\ncode, but also to reassure consumers about the security of a product or service<br \/>\nand the privacy of their data.&#8221; <\/p>\n<\/p><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/singapore\/2022\/02\/09\/119080\/demand-for-crowdsourced-security-booms-yeswehack-bug-bounty-platform-continues-to-thrive\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PARIS, FRANCE and SINGAPORE &#8211;\u00a0Media OutReach\u00a0&#8211;\u00a09 February 2022\u00a0&#8211;\u00a0YesWeHack, Europe&#8217;s leading Bug Bounty platform, today announced strong growth, with its annual revenue more than doubling globally. In Asia, YesWeHack revenue grew by a substantial 200%. YesWeHack&#8217;s community of ethical hackers has grown by 75%, with over 35,000 hackers now operating on the platform. On average, 1,200 &hellip;<\/p>\n","protected":false},"author":1,"featured_media":20311,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/20310"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=20310"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/20310\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media\/20311"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=20310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=20310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=20310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}