Best Hacker Movies – The Definitive List

As is the case with many things, this post is the product of being bored on a long flight with Internet access. I made a deliberately vague but provocative Twitter poll, which subsequently blew up and spawned an amazing list of hacker movies recommendations – Ranging through cybersecurity, cypherpunk, and cybercrime genres: We decided to

By Thought Leadership
Homeland Security to Establish Vulnerability Disclosure; House Pushes for Formalization of CISO role

Last week, the House voted to approve H.R. 6735, a bill that directs the Homeland Security Secretary to establish a vulnerability disclosure policy for the agency’s websites. This was a swift decision — The House Homeland Security Committee advanced this bill just last week — as well as a timely one. Crowdsourced security has been

By Cybersecurity NewsThought LeadershipVulnerability Disclosure
Fighting Climate Change with Ice Stupas

As we begin this fall season, with renewed enthusiasm and excitement, I reflect on my favorite examples of people who think differently to achieve greatness and feel inspired to think outside-of-the-box.    In part 1 of my #outhackthemall series, I spoke about Jonny Moseley — profound Olympic freestyle skier who developed offbeat training methods that

By Thought Leadership
White House Takes A Stance on National Cybersecurity

Today the White House rolled out its long awaited National Cybersecurity Strategy. It was very exciting – but also a little unsurprising – to see crowdsourced security front and center as one of the few named solutions: The United States Government will also promote regular testing and exercising of the cybersecurity and resilience of products

By Thought Leadership
The Ultimate Guide to Managed Bug Bounty

Attack surfaces over the past decade have become more complex than ever, and the overall surface area has ballooned significantly. As our world continues to come online, cybersecurity vulnerabilities become even more apparent. No one thinks—or cares—more about cybersecurity than the security professionals responsible for protecting their enterprise’s applications and data. And their lives get

By Bug Bounty ManagementCompany ResourcesThought Leadership
HBD #6 Bugcrowd!

This blog post originally appeared on Casey’s Medium blog.  6 years ago today I got off a plane armed with a bunch of notes. I’d spent a week meeting with pen-testing customers in Melbourne, and I’d been talking to them about bug bounty programs. These conversations and a set of ideas I’d been noodling on

By Thought Leadership
Integrating Crowdsourced Security with the Software Development Lifecycle

Organizations in nearly every industry are feeling pressure to deliver value faster, get to market ahead of the competition, and continuously improve their customer experience. For software applications built and deployed today, it is all about velocity and automation. This is good for innovation but often leads to inconsistencies, vulnerabilities and problems with upgrades and

By Company ResourcesThought Leadership