Request a Demo Contact Us
Bugcrowd Achieves Global CREST Accreditation For Pen Testing
Learn More

How to Hack with InsiderPhD: Access Control

Access Control


This week we take a look at Access Control. What is it, what are the types, and how can you break it?

About the Author


Katie is a lecturer of Cyber Security at Manchester Metropolitan University and an Early Career Researcher in the domain of Security Research. She is a PhD from Cranfield University, studying natural language processing and insider threat. Her research roughly revolves around the intersection of AI/ML and InfoSec, both in how AI/ML can improve security applications and processes, supporting practitioners rather than supplanting them and the security of AI/ML systems. She’s very interested in pedagogy and teach on MMU’s Cyber Security degree program at Degree Apprenticeship, Undergraduate and Postgraduate level. She’s interested in new teaching methods and incorporating gamification and interactivity into lectures. She speaks at conferences and events fairly often and has had the pleasure to speak at CISA’s (Cyber Security and Infrastructure Agency) Cybersummit, BlackHat, British Computing Society, OWASP (Open Web Application Security Project) as well as speaking at events with industry partners.

In her free time she is an occasional bug bounty hunter, and makes educational cyber security YouTube videos for an audience of over 30,000 people! She used to work at Bugcrowd where she helped provide support to the community team in all things InfoSec and bug hunting. Although she is a data scientist/engineer at heart, security is really growing on her and she says it’s been great to leverage her data brain to help make the internet more secure. She’s now found herself knee deep in cyber security, having reported security vulnerabilities to large organizations such as Verizon Media and the US Department of Defense.

Want more from InsiderPhD? Follow her on Twitter here!

More resources

Report

Inside the Mind of a Hacker

Read More
Datasheet

Crowdsourced Security in the Public Sector

Read More
Datasheet

Bugcrowd External Attack Surface Management (EASM)

Read More

Get Started with Bugcrowd

Every minute that goes by, your unknown vulnerabilities leave you more exposed to cyber attacks.