Blog

Home > Blog > hacker powered security report

hacker powered security report

Browse by Category

Recent Posts

118 Fascinating Facts from HackerOne’s Hacker-Powered Security Report 2018

Read 118 of the most intriguing data points from HackerOne’s Hacker-Powered Security Report 2018. Get the facts to learn how security teams are working with hackers to crush more bugs and make the internet safer for everyone.

HackerOne
Read More

The Hacker-Powered Security Report 2018

The Hacker-Powered Security Report 2018 is the most comprehensive report on hacker-powered security. Analysis of 78,275 security vulnerability reports received in the past year from ethical hackers that reported them to over 1,000 organizations through HackerOne.

HackerOne
Read More

Key Findings From The Hacker-Powered Security Report: Security Vulnerabilities Worry Companies the Most (6 of 6)

We surveyed our customers to see what their security focus is. Read the summarized data of our survey results that are published in the Hacker-Powered Security Report.

Luke Tucker
Read More

Key Findings From The Hacker-Powered Security Report: Vulnerability Disclosure Policies (5 of 6)

The Hacker-Powered Security Report found that, despite increased bug bounty program adoption and recommendations from federal agencies, 94 percent of the top publicly-traded companies do not have known vulnerability disclosure policies (VDP).

Luke Tucker
Read More

5 Hacker-Powered Trends You Need to Know About

For your quick reference, we’ve distilled the Hacker-Powered Security Report to 5 key trends that show how white-hat hackers are shaping the world of security.

HackerOne
Read More

Key Findings From The Hacker-Powered Security Report: Bounty Payments Are Increasing (4 of 6)

As you can imagine, money talks. Better hackers — those with more experience and in-demand skills — go where the money is, and that means organizations that pay more generally get access to the best talent.

Luke Tucker
Read More

Key Findings From The Hacker-Powered Security Report: Responsive Programs Attract Top Hackers (3 of 6)

The Hacker-Powered Security Report found that hackers are overwhelmingly attracted to the programs that are the fastest at acknowledging, validating, and resolving submitted vulnerabilities.

Luke Tucker
Read More

Key Findings From The Hacker-Powered Security Report: Security Responsiveness is Improving (2 of 6)

The Hacker-Powered Security Report found that the average time to first response for security issues was 6 days in 2017, compared to 7 days in 2016.

Luke Tucker
Read More

Security Risk Assessment Report - Key Facts

Our Hacker-Powered Security Report is so chock-full of compelling insights, interesting tidbits, and surprising stats that we decided to distill them down to just the top 100.

Luke Tucker
Read More

Key Findings From The Hacker-Powered Security Report: It’s Not Just For Tech (1 of 6)

When hacker-powered security is mentioned, you might assume it’s a bleeding-edge technique reserved for risk-tolerant tech firms. But incorporating bug bounty programs, working with ethical hackers, and encouraging vulnerability disclosures is being adopted across industries.

Luke Tucker
Read More