" />
Technology

The Industry of Ethical Hackers: Interview

The Industry of Ethical Hackers: Interview

Hackers, allusive individuals that seems to have no limit to their technical abilities, at least that’s what TV and films would have you believe.

However, for many, hacking isn’t about bringing down the world’s financial systems as seen in Mr.Robot, or hijacking a fleet of cars to pull off an insane highest, as the latest Fast and Furious film demonstrates. No, for some it is a regular 9-5 job, for normal people who just happen to have an interest in technology and how things work.

Kelly Matt

Kelly Matt

To get a better understanding of what life is like as an ethical hacker, we spoke with Kelly Matt, a Managing Consultant at A-LIGN, a security and compliance solutions provider, who works on Penetration Testing for companies.

Prior to joining A-LIGN, Matt was Manager of Information Security for Recreational Equipment Incorporated (REI Co-Op) where he was responsible for both offensive and defensive security services. He led the teams responsible for security engineering, threat and vulnerability management, penetration testing, and cybersecurity incident management.

A-LIGN also host regular Ask Me Anything sessions on Reddit, which have had some interesting question with some equally interesting responses. Below are a collection of the top questions from their most recent AMA session, followed by a few question that The Sociable discussed with Matt personaly.

What misconceptions about hacking/the hacking community portrayed in the media frustrates you the most?

In seriousness, hackers are always portrayed as the evil person, and when you go to conferences like DefCon and hang out in the community, by and large, the community is people who are interested in how things work. It’s just people that are curious and have a different way in approaching problems. The demonization and the hooded individual in the media is way overdone.

The most common security advice I see is that everyone should enable 2-factor authentication everywhere it’s available. Does it matter which type of 2FA you use (SMS, authenticator apps, physical devices)? Are some of them more secure from various attacks?

Absolutely! Text messaging is actually very susceptible to attacks. Many government entities and compliance regimes are no longer allowing MFA to be text-based. As long as you get away from text-based MFA, you’re in a much better state. But if your options are nothing or text, I would still recommend using something additional.

Was hacking an interest of yours when you were younger? And if so did you ever use it to your advantage? For example, Bill Gates apparently hacked his school’s computer system to meet girls.  

Yes, I remember I was on BBS systems before there was an internet, and like others at the time, I was curious about computer networks and phone systems.  No, never used for my advantage.  Just young and inquisitive.

Slightly less to do with hacking, What technology are you really look forward to seeing develop over the next five years? 

AI and deep learning continues to be an area that will be interesting to watch over the next 5 years.  It seems like we may be on the precipice of some very interesting developments.  Especially when it comes to digital assets and systems controlling real physical systems.  However, I tend to lean more toward Elon Musk with my apprehension of how deep learning will impact our world as we continue to see the lines blurred between the logical and physical.

It is common for hackers to demand Bitcoin as payment for encrypted files after a ransomware attack. What are your thoughts surrounding Cryptocurrencies such as Bitcoin and how do you see them effecting hacking in the foreseeable future? 

As long as people keep paying the extortion demands, we will continue to see cryptochromes fuel the continued growth of ransomware based attacks.  However, cryptocurrency is really a subordinate topic when discussing “hackers”.  Really the best way to deal with the cryptocurrencies issue as it relates to extortion is to take away the leverage by managing systems effectively so you don’t fall prey to these attacks and never pay.

View Comments (2)

2 Comments

  1. Pingback: How tech can help solve any mishaps in gift giving to millennials | Tech Bit

  2. Pingback: The Industry of Ethical Hackers: Interview – quarterlytech.com

Leave a Reply

Your email address will not be published. Required fields are marked *

Technology

Sam is an energetic and passionate writer/blogger, always looking for the next adventure. In August 2016 he donated all of his possessions to charity, quit his job, and left the UK. Since then he has been on the road travelling through North, Central and South America searching for new adventures and amazing stories.

More in Technology

Biometric smart cards vs digital wallets: payments may depend on the continent you call home

Peter AndringaJanuary 15, 2018
blockchain cricket chicken

Chinese blockchain chickens and a cricket farm to feed the world

Sam Brake GuiaJanuary 15, 2018
mindfulness, apps, spirituality, silicon valley

On being mindful about multi-million mindfulness industry

Ben AllenJanuary 12, 2018

More than swiping right: How these 36 questions can result in love between strangers

Sam Brake GuiaJanuary 11, 2018
slaughterbots

Slaughterbots fresh out of a Black Mirror nightmare and other threats for 2018

Sam Brake GuiaJanuary 11, 2018
motivation intelligence children

Motivation vs intelligence in children and young adults

Sam Brake GuiaJanuary 10, 2018

Ads in the sky, new light technology, and not an AdBlocker in sight

Sam Brake GuiaJanuary 9, 2018

‘Selfitis’: Obsessive selfie taking as a real disorder and the fake news stories that inspired its research

Sam Brake GuiaJanuary 9, 2018
food insecurity, tech, food banks

The Tech Companies Tackling Food Insecurity

Ben AllenJanuary 9, 2018