the study on the hacker-
powered security ecosystem
hack for good // JESSET H E 4 T H A N N U A L
HACKER
POWERED
SECURITY
REPORT
2
T H E 4 T H A N N U A L h a c k e r p o w e r e d s e c u r i t y r e p o r t
3
B
ut what does that path look like? In the physical
world, COVID-19 is ravaging the international
community. Negative externalities are flowing
into the digital space, as well. This year, organizations
across the globe have made unexpected changes
to their operations. Businesses are figuring out how
to contend with accelerated digital transformation
and a surge in digital transaction volume. Many have
had to expedite their decision to move to the cloud.
Companies are hurrying to support hundreds or
thousands of employees who are suddenly working
remotely. To adapt to changing spending patterns,
companies have launched new digital products and
revenue streams, fighting to keep revenue flowing
during a global recession.
EXECUTIVE SUMMARY
This is a time of unprecedented challenges. We face never-before-
seen threats in the digital and physical worlds. If this past year has
taught us anything, it is this: we need to leave behind our old tools,
mindsets, and methods to create a path ahead.
In doing so, organizations are opening up new attack
surfaces they are unprepared to protect. Protection
efforts are left in the hands of security teams who
are not staffed to cope. The result? Losses that can
be measured in data, revenue, reputational damage,
operational disruption, and churn.
For organizations that operate in the digital space,
there’s no such thing as business-as-usual anymore—
which means that business-as-usual security can no
longer suffice. Security leaders are starting to ask some
tough questions. If you’re facing resource constraints,
how do you design software that’s secure from the
start? How can you protect software applications as
they move to the cloud? How do you scale security on
a constantly-evolving attack surface? Is there a way to
maintain