Skip to main content
KPMG’s Cyber Security Expert Offers Advice for Bug Bounty Success
Vulnerability Management, Bounty, Best Practices, Company Resources

KPMG’s Cyber Security Expert Offers Advice for Bug Bounty Success

Before you propose a bug bounty program to your organization, you need a comprehensive plan. That’s just one of the many takeaways offered on a recent...

OneWeb and HackerOne blog
Customer Stories, Best Practices, Bounty

How OneWeb is Safeguarding its Assets with the Hacker Community

HackerOne sat down with Wendy Ng, Principal Cloud Security Architect at OneWeb, to talk about their experience...

Bounty, Best Practices, Customer Stories

TikTok Celebrates Two Years of Bug Bounty

TikTok, a social media giant with more than 1 billion active monthly users, understands the importance of a...

Bounty, Customer Stories

Announcing the Results of Hack U.S.

On July 4th, 2022, Chief Digital and Artificial Intelligence Office (CDAO), Directorate for Digital Services...

How Wix Uses HackerOne to Improve Their Cybersecurity Posture
Customer Stories, Application Security, Best Practices, Bounty, Vulnerability Management

How Wix Improves Their Security Posture with Ethical Hackers

Reducing risk is fundamental to Wix’s approach to cybersecurity, and as the threat landscape evolves, they...

A.S. Watson CISO blog
Customer Stories, Best Practices, Bounty

How Ethical Hackers Help A.S. Watson Address Digital Risk

We recently met with A.S. Watson’s Chief Information Security Officer (CISO), Feliks Voskoboynik, to learn how...

Gitlab March 2022 blog header
Bounty, Best Practices, Customer Stories

Shifting Left with Ethical Hackers: A Q&A with GitLab

Secure applications start with secure code. As organizations deploy code faster than ever, implementing...

TikTok blog repost
Customer Stories, Bounty, New Program Launch

TikTok Celebrates One Year of Bug Bounty

As part of an ongoing commitment to proactive cybersecurity, TikTok celebrated its one-year anniversary of...

Jedox CTO
Best Practices, Customer Stories, Bounty, Penetration Testing

Jedox’s Journey with HackerOne: A Q&A with CTO, Vladislav Maličević

Jedox secures their cloud - and their customers - with HackerOne Assessments and HackerOne Bounty. Read this...