Blog

Home > Blog > best practices

best practices

Browse by Category

Recent Posts

What Years of AWS Hacking Tells Us About Building Secure Apps

Years of AWS bug bounties have exposed SSRF vulnerabilities, misconfigurations, and dangling DNS records. What can we learn from these vulnerabilities about mitigating risk?

Jobert Abma
Read More

Quantifying Risk: How do you measure success in security?

When your job is all about avoiding costly incidents and mistakes, it’s hard to put a dollar value on your work. At HackerOne’s recent Security@ conference, Slack and Hyatt’s CISOs sat down for a chat about their challenges and the hacks they use to quantify risk: 

HackerOne
Read More

Cybersecurity Vendor Consolidation: Securing More with Less

Discover how hacker-powered security solutions can help identify the gaps and consolidate point-solution tools into a single platform for easier management and measured ROI.

HackerOne
Read More

What to Look For in a Penetration Testing Company

Penetration testing is one of the most widely used techniques to comply with security regulations and protect network and computing systems and users. Hacker-powered penetration tests are emerging as a more cost-effective way to harden applications. With HackerOne Challenge, selected hackers from our community are invited to find vulnerabilities in your systems, and you only pay for the verified vulnerabilities found.  

HackerOne
Read More

How Bug Bounties Help You Shift Left


HackerOne
Read More

Security@ Fireside Chat: Insights from Phil Venables of Goldman Sachs


HackerOne
Read More

Keynote with Phil Venables of Goldman Sachs


HackerOne
Read More

8 High-Impact Bugs and How HackerOne Customers Avoided a Breach: Privilege Escalation


HackerOne
Read More

Learn How HackerOne Can Help You Crawl, Walk, or Run Your Way to a Bug Bounty Program

No matter your company size or security team bandwidth, learn how to get a bug bounty program started with advice from those who’ve launched hundreds of new programs. This webinar explains how to get a program started at your own pace, what you need to think about before you start, and how you can control the program’s impact on your existing infrastructure. It’s only 25 minutes, so grab a coffee, take a break, and watch it now.

HackerOne
Read More

Security at Startup Speed: Enterprise Grade Security from the Start

Startups today must adapt to a rapidly changing environment, completing security tasks along with code deploys and automating security scans as much as possible. But even with these measures, security vulnerabilities find a way to slip through the cracks. That’s where hacker-powered security can put out the embers of the fire you may have missed. Learn how hacker-powered security allows startups to launch smart.

HackerOne
Read More