Thursday, November 6, 2025
LBNN
  • Business
  • Markets
  • Politics
  • Crypto
  • Finance
  • Energy
  • Technology
  • Taxes
  • Creator Economy
  • Wealth Management
  • Documentaries
No Result
View All Result
LBNN

50 shades of ethical hacking – IT News Africa

Simon Osuji by Simon Osuji
July 19, 2023
in Technology
0
50 shades of ethical hacking – IT News Africa
0
SHARES
2
VIEWS
Share on FacebookShare on Twitter

Related posts

Novo, Lilly cut deal with Trump to lower prices of obesity drugs

Novo, Lilly cut deal with Trump to lower prices of obesity drugs

November 6, 2025
NNPCL charts sustainable course for Africa’s energy future, wins ADIPEC award – EnviroNews

NNPCL charts sustainable course for Africa’s energy future, wins ADIPEC award – EnviroNews

November 6, 2025

What color hat is the hacker that just penetrated your organization without your permission wearing? Gray? Black? White?

Hacking is often perceived as a dichotomous matter, with two distinct sides: either you are a malicious hacker who intrudes into systems for personal gain, or you are an ethical hacker who tests security for the greater good. However, what if you are a cybersecurity expert who hacks into a client’s network without their consent? Does that still qualify as ethical hacking, or does it cross a boundary? According to South African law, ethical hacking necessitates authorization from the target. “There is no middle ground; you are either an ethical hacker or not,” asserts Stephen Osler, Co-Founder and Business Development Director at Nclose.

Osler elucidates, “It is not viable to have a white-hat individual infiltrate a company without notifying them of an imminent attack. This blurs the line and ventures into the realm of black and grey-hat activities, where hackers discover and report network vulnerabilities without permission. Typically, this type of hacking endeavor culminates in hackers demanding payment to resolve or disclose the issue.”

White-hat hacking endeavors to identify and address weaknesses and problems within a customer’s system, enabling both the cybersecurity experts and the organization to fortify their security and detect vulnerabilities. Skilled hackers employ techniques such as phishing, social engineering, security scanning, and penetration testing to identify the weakest links in an organization’s security framework. This approach ensures that a company’s systems are robust and secure, and safeguard against costly mistakes perpetrated by black-hat hackers.

“This is an entirely distinct approach that ensures comprehensive security across a customer’s platform and business,” Osler affirms. “When a group of hackers suddenly goes rogue and attempts to breach a company’s system without consent, they are attacking the company and venturing straight into the realm of cybercriminals.”

Osler continues, “There exists an approach wherein a red team of attackers and a blue team of defenders are employed, with the red team attempting to breach the company’s defenses. Some cybersecurity experts argue that informing the blue team about the attack defeats the purpose, as they believe that the true value lies in testing their ability to promptly detect a cyber incident. Testing efficiency is undermined if people are forewarned. However, we believe that the optimal approach is to merge the two teams, creating a method known as purple teaming.”

This collaborative approach combines the expertise of both teams, facilitating mutual learning and the development of robust security skills that benefit both the organization and the cybersecurity service provider. The blue team defends the network and challenges the red team to intensify their efforts to breach it, while the red team explores new methods to overcome the blue team’s defenses. With this cooperative approach, everyone benefits, and unauthorized hacking is avoided.

Osler concludes, “This is a far more effective method of maintaining skills, evaluating defenses, and bolstering a company’s security compared to hacking without permission. Unauthorized hacking not only damages trust, leaving the company feeling violated rather than supported, but it also raises concerns regarding ethics, access to private company information, regulations, and the law, which are too crucial to disregard. It is preferable to adopt a collaborative approach that benefits all parties involved while keeping the hacking hats as white as possible.”

By Stephen Osler, Co-Founder and Business Development Director at Nclose.

Source link

Previous Post

Unmasking Satan’s Lies About Our Identity in God

Next Post

‘Thunder floor’ found at ancient Andean site in Peru

Next Post
‘Thunder floor’ found at ancient Andean site in Peru

‘Thunder floor’ found at ancient Andean site in Peru

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RECOMMENDED NEWS

Denver’s storied tradition of sex work, then and now

Denver’s storied tradition of sex work, then and now

1 month ago
Feature: SADC’s withdrawal from Mozambique – has SAMIM fulfilled its mandate?

Feature: SADC’s withdrawal from Mozambique – has SAMIM fulfilled its mandate?

2 years ago
Rising security fears in South Africa as scammers weaponise WhatsApp voice notes

Rising security fears in South Africa as scammers weaponise WhatsApp voice notes

1 month ago
New Akeso, Summit data stir debate on PD-1/VEGF drugs

New Akeso, Summit data stir debate on PD-1/VEGF drugs

6 months ago

POPULAR NEWS

  • Ghana to build three oil refineries, five petrochemical plants in energy sector overhaul

    Ghana to build three oil refineries, five petrochemical plants in energy sector overhaul

    0 shares
    Share 0 Tweet 0
  • The world’s top 10 most valuable car brands in 2025

    0 shares
    Share 0 Tweet 0
  • Global ranking of Top 5 smartphone brands in Q3, 2024

    0 shares
    Share 0 Tweet 0
  • Top 10 African countries with the highest GDP per capita in 2025

    0 shares
    Share 0 Tweet 0
  • When Will SHIB Reach $1? Here’s What ChatGPT Says

    0 shares
    Share 0 Tweet 0
  • Privacy Policy
  • Contact

© 2023 LBNN - All rights reserved.

No Result
View All Result
  • Home
  • Business
  • Politics
  • Markets
  • Crypto
  • Economics
    • Manufacturing
    • Real Estate
    • Infrastructure
  • Finance
  • Energy
  • Creator Economy
  • Wealth Management
  • Taxes
  • Telecoms
  • Military & Defense
  • Careers
  • Technology
  • Artificial Intelligence
  • Investigative journalism
  • Art & Culture
  • Documentaries
  • Quizzes
    • Enneagram quiz
  • Newsletters
    • LBNN Newsletter
    • Divergent Capitalist

© 2023 LBNN - All rights reserved.