Blog

Home > Blog > hacker powered security report

hacker powered security report

Browse by Category

Recent Posts

Organizations Paid Hackers $23.5 Million for These 10 Vulnerabilities in One Year

HackerOne report reveals cross-site scripting, improper access control, and information disclosure top list of most common and impactful vulnerabilities

HackerOne
Read More

COVID Confessions of a CISO

The COVID-19 crisis has shifted life online. As companies rush to meet remote work requirements and customer demands for digital services, attack surfaces have dramatically expanded, leaving security teams stretched thin and not staffed to cope. HackerOne dug into this concept to identify COVID-19 impacts on security and business. Read on for our findings.

HackerOne
Read More

118 Fascinating Facts from HackerOne’s Hacker-Powered Security Report 2018

Read 118 of the most intriguing data points from HackerOne’s Hacker-Powered Security Report 2018. Get the facts to learn how security teams are working with hackers to crush more bugs and make the internet safer for everyone.

HackerOne
Read More

The Hacker-Powered Security Report 2018

The Hacker-Powered Security Report 2018 is the most comprehensive report on hacker-powered security. Analysis of 78,275 security vulnerability reports received in the past year from ethical hackers that reported them to over 1,000 organizations through HackerOne.

HackerOne
Read More

Key Findings From The Hacker-Powered Security Report: Security Vulnerabilities Worry Companies the Most (6 of 6)

We surveyed our customers to see what their security focus is. Read the summarized data of our survey results that are published in the Hacker-Powered Security Report.

Luke Tucker
Read More

Key Findings From The Hacker-Powered Security Report: Vulnerability Disclosure Policies (5 of 6)

The Hacker-Powered Security Report found that, despite increased bug bounty program adoption and recommendations from federal agencies, 94 percent of the top publicly-traded companies do not have known vulnerability disclosure policies (VDP).

Luke Tucker
Read More

5 Hacker-Powered Trends You Need to Know About

For your quick reference, we’ve distilled the Hacker-Powered Security Report to 5 key trends that show how white-hat hackers are shaping the world of security.

HackerOne
Read More

Key Findings From The Hacker-Powered Security Report: Bounty Payments Are Increasing (4 of 6)

As you can imagine, money talks. Better hackers — those with more experience and in-demand skills — go where the money is, and that means organizations that pay more generally get access to the best talent.

Luke Tucker
Read More

Key Findings From The Hacker-Powered Security Report: Responsive Programs Attract Top Hackers (3 of 6)

The Hacker-Powered Security Report found that hackers are overwhelmingly attracted to the programs that are the fastest at acknowledging, validating, and resolving submitted vulnerabilities.

Luke Tucker
Read More

Key Findings From The Hacker-Powered Security Report: Security Responsiveness is Improving (2 of 6)

The Hacker-Powered Security Report found that the average time to first response for security issues was 6 days in 2017, compared to 7 days in 2016.

Luke Tucker
Read More