How Hackers Can Strengthen Cloud Security for Applications
In this session at our 5th annual global cybersecurity conference, HackerOne’s Tim Matthews sat down with Josh Bressers, Tech Lead of Product Security...
Happy Hacker Holiday Gift Guide
Looking for the perfect holiday gift for the favorite hackers in your life? Whether their interests lie in...
6 Reasons Your Security Recruiting Sucks
As we discussed in our previous blog, the security skills shortage may not be quite as real as some industry...
Security Leads Share Bug Bounty Program Tips
HackerOne hosted a security panel, lead by Magoo, on bug bounty programs and we want to share some key...
Improving Signal Over 10,000 Bugs
HackerOne reached the milestone of 10,000 bugs fixed on the platform, and we want to take this opportunity to...
Legally Blind and Deaf - How Computer Crime Laws Silence Helpful Hackers
A world wide war is being waged in which the most able-bodied soldiers are being discouraged from enlisting...
What's in a Name?
While there are many interpretations of the word "hacker," we choose to pay homage to the original MIT hackers...
The Tale of the Privacy Pink Panther
Last Friday, on my way home from 31c3, a funny thing happened on my way through Charles de Gaulle airport in...
Introducing Reputation
One of the primary challenges when running a vulnerability coordination program is distinguishing the signal...