Def Pen
  • News
    • World
    • US
    • Politics
  • Music
    • News
    • Hip Hop
    • R&B
    • Pop
    • First To The Aux
  • Sports
    • Basketball
      • NBA
      • WNBA
      • NCAAB
      • EuroLeague
      • High School
    • Football
      • NFL
      • XFL
      • NCAAF
    • Baseball
      • MLB
    • MMA
    • Boxing
    • FIFA
    • Sports Betting
    • Track & Field
  • Fashion
  • Business
  • Movies
    • Trailers
  • TV
  • Tech
  • Women
    • Spotlight On Empowerment
  • Shop
Def Pen
  • News
    • World
    • US
    • Politics
  • Music
    • News
    • Hip Hop
    • R&B
    • Pop
    • First To The Aux
  • Sports
    • Basketball
      • NBA
      • WNBA
      • NCAAB
      • EuroLeague
      • High School
    • Football
      • NFL
      • XFL
      • NCAAF
    • Baseball
      • MLB
    • MMA
    • Boxing
    • FIFA
    • Sports Betting
    • Track & Field
  • Fashion
  • Business
  • Movies
    • Trailers
  • TV
  • Tech
  • Women
    • Spotlight On Empowerment
  • Shop
  • Tech

From Basements to the Boardroom – How Hacking became Big Business

  • October 27, 2018
  • Jared Brown
Hacking is a big business.

The stereotypical view of hackers being savant-like loners who still live with their parents and pick apart government security systems just for fun is sorely out of date.

In fact, it is safe to say that with the dawn of the digital age, hacking has become a mainstream concern. From sizeable black hat organizations to their white hat counterparts on the virtuous side of the spectrum, it has moved from a casual pastime to a legitimate profession.

Here’s a look at the trajectory that took hacking from the basement to the boardroom, charting its rise to prominence and assessing its significance today.

Humble Beginnings

The concept of hacking has been in circulation for almost half a century, gaining traction at a time when home computing became viable in the 1980s and then expanding to factor in the subversion of security governing remote systems when network connectivity blossomed.

When early practitioners were toying with coding in their spare time, it was more of a curio of computer culture. Once it became apparent that it could have problematic applications, as well as beneficial ones, things changed.

By the 1990s, entire movies based around hacking were commonplace, from the descriptively titled Hackers to Sandra Bullock vehicle The Net. While Hollywood may not have depicted the process accurately, the fact that it was attempting to in the first place showed how prominent it had become.

Significant Steps

Big businesses started to take note of the potential for hacking to cause disruption at the dawn of the millennium when a 15 year old Canadian took out various prominent e-commerce and media sites. The aftermath cost more than a billion dollars to clear up but also set a precedent for how the industry would develop.

Its perpetrator is now a cybersecurity specialist, helping businesses to face down the threats that are posed by malicious third parties. And he is not alone; companies like Fidus Infosec now provide penetration testing services, using ethical hacking techniques to empower organizations of all sizes and weed out weaknesses in security setups to prevent real attacks from succeeding.

Of course, such services come at a price, but it is one which many organizations are willing to pay, especially when contextualized in comparison with the cost of suffering a data breach. On average a US business can expect to be hit to the tune of $1.3 million if a cyber attack occurs. For larger organizations, the expense can be significantly greater; companies listed on the FTSE 100 will suffer a £120 million ($155 million) fallout.

From the perspective of the boardroom, embracing hacking as well as having a healthy respect for it is now a no-brainer. As such it is also no surprise to see that IT security spending is expected to grow by 16.1 percent annually over the next decade, hitting $365 billion in 2026.

Current Conundrums

The robust size and continued rise of ethical hacking may have turned this once niche hobby into a vast international market stewarded by professionals, but this has only been possible because the scope of the risks associated with operating a business today has expanded exponentially.

Sure, teenagers can still take down major businesses alone, but the larger issue is that cybercriminal gangs are operating on a large scale, with well-organized operations allowing them to orchestrate attacks on a whim.

Some hackers even sell their services on-demand, allowing corporate rivals or entire governments to gain easy access to extensive, disruptive resources.

The need for hacking has never been greater, and this is an arms race that shows no sign of slowing down.

Jared Brown

Def Pen Founder

You May Also Like
View Article
  • Tech

How to Recover Data from a Formatted Hard Drive

  • Josh Samuels
  • April 29, 2025
View Article
  • Music
  • Tech

Spotify, Warner Music Unveil Multiyear Agreement

  • Ryan Shepard
  • February 6, 2025
View Article
  • Music
  • Tech

Spotify, UMG Announce New Multi-Year Agreement

  • Ryan Shepard
  • January 28, 2025
View Article
  • News
  • Politics
  • Tech
  • US

Bill Gates Calls Elon Musk’s Political Presence ‘Insane S—t’

  • Ryan Shepard
  • January 28, 2025
View Article
  • News
  • Tech
  • US

Apple CEO Tim Cook Donates $1 Million To Inauguration

  • Ryan Shepard
  • January 19, 2025
View Article
  • News
  • Tech
  • US

TikTok, CapCut Suspend Service Amid Looming Ban

  • Ryan Shepard
  • January 18, 2025
Spotify
View Article
  • Music
  • Tech

Spotify Cancels GRAMMY Week Events Amid Los Angeles Wildfires

  • Ryan Shepard
  • January 17, 2025
View Article
  • MMA
  • News
  • Politics
  • Tech
  • US

Dana White, Elon Musk Expected To Appear At Donald Trump’s Madison Square Garden Rally

  • Ryan Shepard
  • October 26, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

©Copyright 2025 DefPen.com. All rights reserved.

Def Pen is a registered trademark. DefPen.com is part of the Def Pen Media Group, LLC.

  • Contact
  • Advertising
  • Privacy Policy
  • DMCA
  • Shop

Input your search keywords and press Enter.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT