The data loss rates across industries put pressure on companies to rethink their security measures: the current methods appear to be simply untenable. Data protection demands being proactive and getting ahead of the curve.

Having worked as a product manager for the European bug bounty platform HackenProof during the last year, I decided to share my opinion on crowdsourced cybersecurity and its vital importance to the modern-day business.

The ongoing reports on major data breaches reflect the harsh reality of cybersecurity and its current state. Obviously, the cat-and-mouse game is on: hackers are motivated enough with sophisticated tactics at their…

Originally posted on HackenProof Blog.

Not a week goes by without a news report that talks about either a data leak or a hacker attack. According to a recent PWC CEO Survey Report, more than 40% of CEOs are worried about the cyberthreats. And they have good reason to be worried: a recent report compiled by the Center for Strategic and International Studies, states that nearly $600 bn has been lost to cybercrime in 2018 alone. As a result, global spending on cybersecurity has risen 17% in the past 2 years and is projected to be more than $96 Bn…

Originally posted on HackenProof Blog.

Bug bounty programs gradually become more and more mainstream and that’s great news for global cybersecurity. As we’ve discussed in our previous post, bug bounty programs provide companies with a convenient way to access a crowd of cybersecurity experts with various backgrounds without the need to actually pay for an army of cybersecurity experts. But how does a lifecycle of a bug bounty program actually look like?

In this example, we are going to describe a bug bounty program that is hosted on a bug bounty platform.

Lifecycle of a Bug Bounty Program

Step 1 — Creation of a bug bounty…

Originally posted on HackenProof Blog.

Bug Bounty Platforms have access to a much greater talent base than traditional cybersecurity companies. In this post, I’d like to dig a bit deeper into what that means and explain to you how Bug Bounty actually works.

There are two approaches to managing Bug Bounties: some companies choose to self-host their programs, and some use services of a Bug Bounty Platform to launch and coordinate them. The best way to give you an idea on how a Bug Bounty Platform works is to give an example.

Let’s say we have a Company SoftwareCo…

Originally posted on HackenProof Blog.

HackenProof was founded through a Hacken ICO in late 2017. Hacken is an ecosystem of cybersecurity products:

  1. HackenProof — Bug Bounty and Vulnerability Coordination Platform
  2. Hacken Hub — cybersecurity consulting service that specializes on blockchain based products
  3. HackIT — an international conference for cybersecurity specialists
  4. CER — a rating and analytics tool for crypto exchanges

Our headquarters is based in Estonia and our operational office is located in Kyiv. We’ve started working on the HackenProof platform in October 2017 and launched it in March 2018.

Since we are an ICO funded project our development…

Evgenia Broshevan

Head of HackenProof Bug Bounty Platform, Co-Founder of More information:,

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store